US20240069749A1 - Asymmetric pass through voltage for reduction of cell-to-cell interference - Google Patents
Asymmetric pass through voltage for reduction of cell-to-cell interference Download PDFInfo
- Publication number
- US20240069749A1 US20240069749A1 US18/236,087 US202318236087A US2024069749A1 US 20240069749 A1 US20240069749 A1 US 20240069749A1 US 202318236087 A US202318236087 A US 202318236087A US 2024069749 A1 US2024069749 A1 US 2024069749A1
- Authority
- US
- United States
- Prior art keywords
- memory
- wordline
- read
- pass
- target
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000009467 reduction Effects 0.000 title description 8
- 230000015654 memory Effects 0.000 claims abstract description 331
- 238000012545 processing Methods 0.000 claims description 30
- 238000000034 method Methods 0.000 claims description 26
- 230000000977 initiatory effect Effects 0.000 claims 3
- 239000000872 buffer Substances 0.000 description 18
- 238000004891 communication Methods 0.000 description 13
- 238000009826 distribution Methods 0.000 description 13
- 230000003071 parasitic effect Effects 0.000 description 10
- 230000008569 process Effects 0.000 description 10
- 230000008859 change Effects 0.000 description 8
- 230000000694 effects Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 230000016571 aggressive behavior Effects 0.000 description 6
- 238000010168 coupling process Methods 0.000 description 6
- 238000005859 coupling reaction Methods 0.000 description 6
- 230000008878 coupling Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 5
- 230000004044 response Effects 0.000 description 5
- 238000013459 approach Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 238000003491 array Methods 0.000 description 3
- 238000004590 computer program Methods 0.000 description 3
- 238000013500 data storage Methods 0.000 description 3
- 230000009977 dual effect Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 239000004065 semiconductor Substances 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000015556 catabolic process Effects 0.000 description 2
- 230000001186 cumulative effect Effects 0.000 description 2
- 238000006731 degradation reaction Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 230000005669 field effect Effects 0.000 description 2
- 230000014759 maintenance of location Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- XUIMIQQOPSSXEZ-UHFFFAOYSA-N Silicon Chemical compound [Si] XUIMIQQOPSSXEZ-UHFFFAOYSA-N 0.000 description 1
- 238000009825 accumulation Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 150000004770 chalcogenides Chemical class 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 230000005684 electric field Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 239000003574 free electron Substances 0.000 description 1
- 238000002347 injection Methods 0.000 description 1
- 239000007924 injection Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000007935 neutral effect Effects 0.000 description 1
- 150000004767 nitrides Chemical class 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 229910021420 polycrystalline silicon Inorganic materials 0.000 description 1
- 229920005591 polysilicon Polymers 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 229910052710 silicon Inorganic materials 0.000 description 1
- 239000010703 silicon Substances 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 230000014616 translation Effects 0.000 description 1
- 230000005641 tunneling Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C11/00—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor
- G11C11/56—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency
- G11C11/5671—Digital stores characterised by the use of particular electric or magnetic storage elements; Storage elements therefor using storage elements with more than two stable states represented by steps, e.g. of voltage, current, phase, frequency using charge trapping in an insulator
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0602—Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
- G06F3/0614—Improving the reliability of storage systems
- G06F3/0619—Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0628—Interfaces specially adapted for storage systems making use of a particular technique
- G06F3/0655—Vertical data movement, i.e. input-output transfer; data movement between one or more hosts and one or more storage devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/06—Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
- G06F3/0601—Interfaces specially adapted for storage systems
- G06F3/0668—Interfaces specially adapted for storage systems adopting a particular infrastructure
- G06F3/0671—In-line storage system
- G06F3/0673—Single storage device
- G06F3/0679—Non-volatile semiconductor memory device, e.g. flash memory, one time programmable memory [OTP]
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/08—Address circuits; Decoders; Word-line control circuits
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/26—Sensing or reading circuits; Data output circuits
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/34—Determination of programming status, e.g. threshold voltage, overprogramming or underprogramming, retention
- G11C16/3418—Disturbance prevention or evaluation; Refreshing of disturbed memory data
- G11C16/3427—Circuits or methods to prevent or reduce disturbance of the state of a memory cell when neighbouring cells are read or written
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/06—Auxiliary circuits, e.g. for writing into memory
- G11C16/34—Determination of programming status, e.g. threshold voltage, overprogramming or underprogramming, retention
- G11C16/3436—Arrangements for verifying correct programming or erasure
- G11C16/3454—Arrangements for verifying correct programming or for detecting overprogrammed cells
- G11C16/3459—Circuits or methods to verify correct programming of nonvolatile memory cells
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C16/00—Erasable programmable read-only memories
- G11C16/02—Erasable programmable read-only memories electrically programmable
- G11C16/04—Erasable programmable read-only memories electrically programmable using variable threshold transistors, e.g. FAMOS
- G11C16/0483—Erasable programmable read-only memories electrically programmable using variable threshold transistors, e.g. FAMOS comprising cells having several storage transistors connected in series
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C2211/00—Indexing scheme relating to digital stores characterized by the use of particular electric or magnetic storage elements; Storage elements therefor
- G11C2211/56—Indexing scheme relating to G11C11/56 and sub-groups for features not covered by these groups
- G11C2211/562—Multilevel memory programming aspects
- G11C2211/5621—Multilevel programming verification
-
- G—PHYSICS
- G11—INFORMATION STORAGE
- G11C—STATIC STORES
- G11C2211/00—Indexing scheme relating to digital stores characterized by the use of particular electric or magnetic storage elements; Storage elements therefor
- G11C2211/56—Indexing scheme relating to G11C11/56 and sub-groups for features not covered by these groups
- G11C2211/564—Miscellaneous aspects
- G11C2211/5648—Multilevel memory programming, reading or erasing operations wherein the order or sequence of the operations is relevant
Definitions
- Embodiments of the disclosure relate generally to memory sub-systems, and more specifically, relate to performing read and program verify operations using an asymmetric pass through voltage for reduction of cell-to-cell interference.
- a memory sub-system can include one or more memory devices that store data.
- the memory devices can be, for example, non-volatile memory devices and volatile memory devices.
- a host system can utilize a memory sub-system to store data at the memory devices and to retrieve data from the memory devices.
- FIG. 1 A illustrates an example computing system that includes a memory sub-system, in accordance with one or more embodiments of the present disclosure.
- FIG. 1 B is a block diagram of a memory device in communication with a memory sub-system controller of a memory sub-system, in accordance with one or more embodiments of the present disclosure.
- FIG. 2 A- 2 D are schematics of portions of an array of memory cells as could be used in a memory of the type described with reference to FIG. 1 B , in accordance with one or more embodiments of the present disclosure.
- FIG. 3 is a block schematic of a portion of an array of memory cells as could be used in a memory of the type described with reference to FIG. 1 B , in accordance with one or more embodiments of the present disclosure.
- FIG. 4 illustrates example arrangements of a target wordline and corresponding adjacent or neighboring wordlines during execution of a read operation and execution of a program verify operation, in accordance with one or more embodiments of the present disclosure.
- FIG. 5 illustrates a graph plotting a level or percent of cell-to-cell interference as a function of a threshold volt shift of an aggressor wordline, in accordance with one or more embodiments of the present disclosure.
- FIG. 6 illustrates example arrangements of a target wordline and corresponding adjacent wordlines during execution of a read operation or a program verify operation with an asymmetric pass through voltage applied to the neighboring wordlines during a pre-aggression stage and a post-aggression stage, in accordance with one or more embodiments of the present disclosure.
- FIG. 7 is a flow diagram of an example method to perform a memory access operation (e.g., a read operation or a program verify operation) of a target wordline including application of asymmetric pass through voltage levels to adjacent wordlines to reduce cell-to-cell interference, in accordance with one or more embodiments of the present disclosure.
- a memory access operation e.g., a read operation or a program verify operation
- FIG. 8 is a block diagram of an example computer system in which embodiments of the present disclosure may operate.
- a memory sub-system can be a storage device, a memory module, or a combination of a storage device and memory module. Examples of storage devices and memory modules are described below in conjunction with FIGS. 1 A- 1 B .
- a host system can utilize a memory sub-system that includes one or more components, such as memory devices that store data. The host system can provide data to be stored at the memory sub-system and can request data to be retrieved from the memory sub-system.
- a memory sub-system can include high density non-volatile memory devices where retention of data is desired when no power is supplied to the memory device.
- One example of non-volatile memory devices is a negative-and (NAND) memory device.
- Other examples of non-volatile memory devices are described below in conjunction with FIGS. 1 A- 1 B .
- a non-volatile memory device is a package of one or more dies. Each die includes one or more planes. For some types of non-volatile memory devices (e.g., NAND devices), each plane includes a set of physical blocks. Each block consists of a set of pages. Each page includes a set of memory cells.
- a memory cell is an electronic circuit that stores information. Depending on the memory cell type, a memory cell can store one or more bits of binary information, and has various logic states that correlate to the number of bits being stored. The logic states can be represented by binary values, such as “0” and “1”, or combinations of such values.
- a memory device can include memory cells arranged in a two-dimensional or a three-dimensional grid.
- the memory cells are formed onto a silicon wafer in an array of columns and rows.
- the memory cells are joined by wordlines, which are conducting lines electrically connected to the control gates of the memory cells, and bitlines, which are conducting lines electrically connected to the drain electrodes of the memory cells.
- the intersection of a bitline and wordline constitutes the address of the memory cell.
- a block hereinafter refers to a unit of the memory device used to store data and can include a group of memory cells, a wordline group, a wordline, or individual memory cells.
- One or more blocks can be grouped together to form separate partitions (e.g., planes) of the memory device in order to allow concurrent operations to take place on each plane.
- Some memory devices can be three-dimensional (3D) memory devices (e.g., 3D NAND devices).
- a 3D memory device can include memory cells that are placed between sets of layers including a pillar (e.g., polysilicon pillar), a tunnel oxide layer, a charge trap (CT) layer, and a dielectric (e.g. oxide) layer.
- a 3D memory device can have a “top deck” corresponding to a first side and a “bottom deck” corresponding to a second side. Without loss of generality, the first side can be a drain side and the second side can be a source side.
- a 3D memory device can be a 3D replacement gate memory device having a replacement gate structure using wordline stacking.
- a memory cell can be programmed (written to) by applying a certain voltage to the cell, which results in an electric charge being held by the cell.
- a voltage signal V CG that can be applied to a control electrode of the cell to open the cell to the flow of electric current across the cell, between a source electrode and a drain electrode.
- Vt also referred to as the “threshold voltage”
- the threshold voltages can be different even for cells implemented on the same die.
- One type of cell is a single level cell (SLC), which stores 1 bit per cell and defines 2 logical states (“states”) (“1” or “L0” and “0” or “L1”) each corresponding to a respective V T level.
- the “1” state can be an erased state and the “0” state can be a programmed state (L1).
- Another type of cell is a multi-level cell (MLC), which stores 2 bits per cell (1 bit for upper page (UP) data and 1 bit for lower page (LP) data) and defines 4 states (“11” or “L0”, “10” or “L1”, “01” or “L2” and “00” or “L3”) each corresponding to a respective V T level.
- the “11” state can be an erased state and the “01”, “10” and “00” states can each be a respective programmed state.
- Another type of cell is a triple level cell (TLC), which stores 3 bits per cell (1 bit for UP data, 1 bit for LP data and 1 bit for extra page (XP) data) and defines 8 states (“111” or “L0”, “110” or “L1”, “101” or “L2”, “100” or “L3”, “011” or “L4”, “010” or “L5”, “001” or “L6”, and “000” or “L7”) each corresponding to a respective V T level.
- TLC triple level cell
- the “111” state can be an erased state and each of the other states can be a respective programmed state.
- Another type of a cell is a quad-level cell (QLC), which stores 4 bits per cell (1 bit for UP data, 1 bit for LP data, 1 bit for XP data, and 1 bit for top page (TP) data) and defines 16 states L0-L15, where L0 corresponds to “1111” and L15 corresponds to “0000”.
- QLC quad-level cell
- PLC penta-level cell
- Other types of cells are also contemplated.
- an n-level cell can use 2 n levels of charge to store n bits of information for n pages.
- a memory device can include one or more arrays of memory cells such as SLCs, MLCs, TLCs, QLCs, PLCs, etc. or any combination of such.
- a memory device can include an SLC portion, and an MLC portion, a TLC portion, a QLC portion, or a PLC portion of cells.
- the distributions (valleys) are interspersed with voltage intervals (“valley margins”) where none (or very few) of the cells of the device have their threshold voltages.
- Such valley margins can, therefore, be used to separate various charge states Q k —the logical state of the cell can be determined by detecting, during a read operation, between which two valley margins the respective threshold voltage V T of the cell resides. Specifically, the read operation can be performed by comparing the measured threshold voltage V T exhibited by the memory cell to one or more reference voltage levels corresponding to known valley margins (e.g., centers of the margins) of the memory device.
- a valley margin can also be referred to as a read window.
- a read window For example, in a SLC cell, there is 1 read window that exists with respect to the 2 Vt distributions. As another example, in an MLC cell, there are 3 read windows that exist with respect to the 4 Vt distributions. As yet another example, in a TLC cell, there are 7 read windows that exist with respect to the 8 Vt distributions. Read window size generally decreases as the number of states increases. For example, the 1 read window for the SLC cell may be larger than each of the 3 read windows for the MLC cell, and each of the 3 read windows for the MLC cell may be larger than each of the 7 read windows for the TLC cell, etc.
- Read window budget RWB refers to the cumulative value of the read windows.
- a memory cell programming operation which can be performed in response to receiving a program or write command from the host, can involve sequentially applying programming voltage pulses to a selected or target wordline (WLn).
- the programming pulse voltage can be sequentially ramped up from the initial voltage value (e.g., 0V) to the final voltage value (e.g., V MAX ).
- the unselected wordlines can, during the programming operation, be biased at a certain voltage, e.g., a pass through voltage, which is less than the programming voltage.
- a program verify operation can be performed to determine if the threshold voltage of the one or more memory cells has increased to a desired programming level.
- Cells of a memory array that are selected for execution of a memory access operation can be referred to target cells connected to a target wordline.
- the target cells can be adjacent to cells connected to at least one wordline neighboring the target wordline (“adjacent wordline”).
- the at least one adjacent wordline can be a single wordline neighboring the target wordline or a pair of wordlines neighboring the target wordline.
- the target wordline can be referred to as an nth wordline (WLn)
- the at least one adjacent wordline can include at least one of adjacent wordline n ⁇ 1 (WLn ⁇ 1) or adjacent wordline n+1 (WLn+1).
- the set of adjacent wordlines can include a wordline located directly above the target wordline and/or a wordline located directly below the target wordline.
- Each target cell has a respective group of adjacent cells.
- Each group of adjacent cells includes at least one cell that neighbors its respective target cell (e.g., one cell connected to WLn ⁇ 1 and/or one cell connected to WLn+1). More specifically, each target cell can be connected to the same bitline as each cell of the respective group of adjacent cells, such that the target cell and the cells of the respective group of adjacent cells are within the same string. Accordingly, each group of adjacent cells can include a single adjacent cell, or a pair of adjacent cells connected to a same bitline as a respective target cell.
- a cell (e.g., NAND cell) of a block can store data in the form of the threshold voltage, which is a lowest voltage at which the cell can be activated (i.e., switched on).
- a read operation and a program verify operation i.e. a “target cell”
- V ref a read reference voltage
- Vt threshold voltage
- Vpass a pass through voltage
- Vpass is a voltage that is chosen to be higher than all of the Vt's of the unread cells, but lower than a programming voltage, to ensure a memory cell is switched on.
- Vpass is a lower voltage than the programming voltage
- the application of Vpass can affect (e.g., increase) the threshold voltage and thus alter logic states of the unread cells of the block via tunneling currents. This phenomenon is referred to as “read disturb.” As more read operations are applied within the block, the accumulation of read disturb over time can lead to read disturb errors.
- Cell-to-cell interference may exist in a memory array between the target cells and their respective groups of adjacent cells.
- Cell-to-cell interference can lead to lateral charge migration and Vt distribution shift.
- Cell-to-cell interference in addition to intrinsic charge loss, can further lead to a widening of V T distributions.
- the V T distribution widening can cause RWB degradation, which can negatively affect memory device reliability. For example, RWB degradation can lead to an increase in the number of errors (e.g., bit errors) and/or error rate (e.g., bit error rate (BER)).
- errors e.g., bit errors
- BER bit error rate
- Certain memory devices include scaling of the distance between gates of adjacent memory cells (i.e., pillar pitch).
- pillar pitch scaling can result in an increase in cell-to-cell (C2C) interference where a threshold voltage shift of one or more memory cells can influence the threshold voltage of one or more neighboring memory cells through parasitic capacitance-coupling effect.
- C2C interference disadvantageously results in an expansion of the corresponding threshold voltage distributions in order to accommodate all possible threshold voltages for a given state and a reduction in the read window budget (RWB) corresponding to the programming distributions associated with the various programming levels.
- the RWB can refer to the cumulative value (e.g., in voltage) of a number (e.g., seven) of distances (e.g., measured in voltage) between adjacent threshold voltage distributions at a particular BER.
- C2C interference can be increased due to multiple causes including a fringing field effect and a parasitic charge effect.
- a fringing field effect is the capacitive coupling of electrons programmed underneath the gate confinement of an aggressor memory cell (i.e., a memory cell being programmed).
- a parasitic charge effect is due to the continuity of the charge storage nitride film or charge trap (CT) layer throughout the pillar, whereby electrons are programmed into one or more inter-cell regions of the CT layer between adjacent memory cells (e.g., an aggressor memory cell and one or more victim memory cells).
- CT charge trap
- the parasitic charge effect occurs during programming of an aggressor memory cell through the creation of electric fields due to application of a pass voltage (Vpass) on a victim memory cell (i.e., a memory cell that is not being programmed) and a program voltage (Vpgm) on the aggressor memory cell.
- Vpass pass voltage
- Vpgm program voltage
- parasitic charges are created near both the aggressor memory cell and the victim memory cell.
- the parasitic charges near the victim memory cell are injected into the CT layer during the programming of the victim memory cell, only parasitic charges near the aggressor memory cell contribute to the increase of C2C interference.
- a program verify operation can be executed following each program pulse so these parasitic charges do not contribute to an upper tail of the victim memory cell.
- the parasitic charges near the aggressor memory cell cause the injection of electrons into the CT layer after the victim memory cell finishes programming, and therefore contributes to the undesirable C2C interference.
- C2C interference can result in the loss of RWB in view of the Vt difference between cells on a target wordline (WLn) and neighboring wordlines (e.g., WLn ⁇ 1 and WLn+1).
- cell-to-cell interference can cause the threshold voltage of the target wordline (WLn) to shift up, with a larger shift occurring as the threshold voltage of WLn+1 (i.e., an aggressor wordline) increases.
- a typical programming operation includes an order of programming of WLn ⁇ 1, WLn, and WLn+1.
- a high C2C coupling occurs on WLn (i.e., the target or victim wordline) due to the prior programming of WLn ⁇ 1, which limits the RWB.
- One approach to addressing the effects of the C2C coupling includes increasing the pass through voltage (Vpass) (i.e., a bias voltage) applied to the immediately adjacent wordlines (WLn ⁇ 1 and WLn+1) during a memory access operation associated with the target wordline (WLn).
- Vpass pass through voltage
- a symmetric or equal pass through voltage (Vpass) is applied to both of the immediately adjacent wordlines (WLn ⁇ 1 and WLn+1).
- Vpass pass through voltage
- Tprog programming time
- Vpass1 is set to a voltage level equal to Vpass2 reduced by an offset voltage level (Vpass_offset).
- a bottleneck of sensed current flowing i.e., current sensed by a sensed amplifier
- Vt threshold voltage
- Advantages of the present disclosure include, but are not limited to, a reduction in C2C interference in a memory device. Furthermore, the application of asymmetric pass through voltages to neighboring wordlines during a read operation or read sub-operation of a program verify operation in accordance with the present disclosure can lead to improved RWB.
- FIG. 1 A illustrates an example computing system 100 that includes a memory sub-system 110 in accordance with some embodiments of the present disclosure.
- the memory sub-system 110 can include media, such as one or more volatile memory devices (e.g., memory device 140 ), one or more non-volatile memory devices (e.g., memory device 130 ), or a combination of such.
- a memory sub-system 110 can be a storage device, a memory module, or a combination of a storage device and memory module.
- a storage device include a solid-state drive (SSD), a flash drive, a universal serial bus (USB) flash drive, an embedded Multi-Media Controller (eMMC) drive, a Universal Flash Storage (UFS) drive, a secure digital (SD) card, and a hard disk drive (HDD).
- SSD solid-state drive
- USB universal serial bus
- eMMC embedded Multi-Media Controller
- UFS Universal Flash Storage
- SD secure digital
- HDD hard disk drive
- memory modules include a dual in-line memory module (DIMM), a small outline DIMM (SO-DIMM), and various types of non-volatile dual in-line memory modules (NVDIMMs).
- the computing system 100 can be a computing device such as a desktop computer, laptop computer, network server, mobile device, a vehicle (e.g., airplane, drone, train, automobile, or other conveyance), Internet of Things (IoT) enabled device, embedded computer (e.g., one included in a vehicle, industrial equipment, or a networked commercial device), or such computing device that includes memory and a processing device.
- a computing device such as a desktop computer, laptop computer, network server, mobile device, a vehicle (e.g., airplane, drone, train, automobile, or other conveyance), Internet of Things (IoT) enabled device, embedded computer (e.g., one included in a vehicle, industrial equipment, or a networked commercial device), or such computing device that includes memory and a processing device.
- vehicle e.g., airplane, drone, train, automobile, or other conveyance
- IoT Internet of Things
- embedded computer e.g., one included in a vehicle, industrial equipment, or a networked commercial device
- the computing system 100 can include a host system 120 that is coupled to one or more memory sub-systems 110 .
- the host system 120 is coupled to multiple memory sub-systems 110 of different types.
- FIG. 1 A illustrates one example of a host system 120 coupled to one memory sub-system 110 .
- “coupled to” or “coupled with” generally refers to a connection between components, which can be an indirect communicative connection or direct communicative connection (e.g., without intervening components), whether wired or wireless, including connections such as electrical, optical, magnetic, etc.
- the host system 120 can include a processor chipset and a software stack executed by the processor chipset.
- the processor chipset can include one or more cores, one or more caches, a memory controller (e.g., NVDIMM controller), and a storage protocol controller (e.g., PCIe controller, SATA controller).
- the host system 120 uses the memory sub-system 110 , for example, to write data to the memory sub-system 110 and read data from the memory sub-system 110 .
- the host system 120 can be coupled to the memory sub-system 110 via a physical host interface.
- a physical host interface include, but are not limited to, a serial advanced technology attachment (SATA) interface, a peripheral component interconnect express (PCIe) interface, universal serial bus (USB) interface, Fibre Pillar, Serial Attached SCSI (SAS), a double data rate (DDR) memory bus, Small Computer System Interface (SCSI), a dual in-line memory module (DIMM) interface (e.g., DIMM socket interface that supports Double Data Rate (DDR)), etc.
- SATA serial advanced technology attachment
- PCIe peripheral component interconnect express
- USB universal serial bus
- SAS Serial Attached SCSI
- DDR double data rate
- SCSI Small Computer System Interface
- DIMM dual in-line memory module
- DIMM DIMM socket interface that supports Double Data Rate (DDR)
- the host system 120 can further utilize an NVM Express (NVMe) interface to access components (e.g., memory devices 130 ) when the memory sub-system 110 is coupled with the host system 120 by the physical host interface (e.g., PCIe bus).
- NVMe NVM Express
- the physical host interface can provide an interface for passing control, address, data, and other signals between the memory sub-system 110 and the host system 120 .
- FIG. 1 A illustrates a memory sub-system 110 as an example.
- the host system 120 can access multiple memory sub-systems via a same communication connection, multiple separate communication connections, and/or a combination of communication connections.
- the memory devices 130 , 140 can include any combination of the different types of non-volatile memory devices and/or volatile memory devices.
- the volatile memory devices e.g., memory device 140
- RAM random access memory
- DRAM dynamic random access memory
- SDRAM synchronous dynamic random access memory
- non-volatile memory devices include a negative-and (NAND) type flash memory and write-in-place memory, such as a three-dimensional cross-point (“3D cross-point”) memory device, which is a cross-point array of non-volatile memory cells.
- NAND negative-and
- 3D cross-point three-dimensional cross-point
- a cross-point array of non-volatile memory cells can perform bit storage based on a change of bulk resistance, in conjunction with a stackable cross-gridded data access array.
- cross-point non-volatile memory can perform a write in-place operation, where a non-volatile memory cell can be programmed without the non-volatile memory cell being previously erased.
- NAND type flash memory includes, for example, two-dimensional NAND (2D NAND) and three-dimensional NAND (3D NAND).
- Each of the memory devices 130 can include one or more arrays of memory cells.
- One type of memory cell for example, single level memory cells (SLC) can store one bit per memory cell.
- Other types of memory cells such as multi-level memory cells (MLCs), triple level memory cells (TLCs), quad-level memory cells (QLCs), and penta-level memory cells (PLCs) can store multiple bits per memory cell.
- each of the memory devices 130 can include one or more arrays of memory cells such as SLCs, MLCs, TLCs, QLCs, PLCs or any combination of such.
- a particular memory device can include an SLC portion, and an MLC portion, a TLC portion, a QLC portion, or a PLC portion of memory cells.
- the memory cells of the memory devices 130 can be grouped as pages that can refer to a logical unit of the memory device used to store data. With some types of memory (e.g., NAND), pages can be grouped to form blocks.
- non-volatile memory components such as a 3D cross-point array of non-volatile memory cells and NAND type flash memory (e.g., 2D NAND, 3D NAND)
- the memory device 130 can be based on any other type of non-volatile memory, such as read-only memory (ROM), phase change memory (PCM), self-selecting memory, other chalcogenide based memories, ferroelectric transistor random-access memory (FeTRAM), ferroelectric random access memory (FeRAM), magneto random access memory (MRAM), Spin Transfer Torque (STT)-MRAM, conductive bridging RAM (CBRAM), resistive random access memory (RRAM), oxide based RRAM (OxRAM), negative-or (NOR) flash memory, or electrically erasable programmable read-only memory (EEPROM).
- ROM read-only memory
- PCM phase change memory
- FeTRAM ferroelectric transistor random-access memory
- FeRAM ferroelectric random access memory
- MRAM magneto random access memory
- a memory sub-system controller 115 (or controller 115 for simplicity) can communicate with the memory devices 130 to perform operations such as reading data, writing data, or erasing data at the memory devices 130 and other such operations.
- the memory sub-system controller 115 can include hardware such as one or more integrated circuits and/or discrete components, a buffer memory, or a combination thereof.
- the hardware can include a digital circuitry with dedicated (i.e., hard-coded) logic to perform the operations described herein.
- the memory sub-system controller 115 can be a microcontroller, special purpose logic circuitry (e.g., a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), etc.), or other suitable processor.
- FPGA field programmable gate array
- ASIC application specific integrated circuit
- the memory sub-system controller 115 can include a processing device, which includes one or more processors (e.g., processor 117 ), configured to execute instructions stored in a local memory 119 .
- the local memory 119 of the memory sub-system controller 115 includes an embedded memory configured to store instructions for performing various processes, operations, logic flows, and routines that control operation of the memory sub-system 110 , including handling communications between the memory sub-system 110 and the host system 120 .
- the local memory 119 can include memory page buffers storing memory pointers, fetched data, etc.
- the local memory 119 can also include read-only memory (ROM) for storing micro-code. While the example memory sub-system 110 in FIG. 1 has been illustrated as including the memory sub-system controller 115 , in another embodiment of the present disclosure, a memory sub-system 110 does not include a memory sub-system controller 115 , and can instead rely upon external control (e.g., provided by an external host, or by a processor or controller separate from the memory sub-system).
- external control e.g., provided by an external host, or by a processor or controller separate from the memory sub-system.
- the memory sub-system controller 115 can receive commands or operations from the host system 120 and can convert the commands or operations into instructions or appropriate commands to achieve the desired access to the memory devices 130 .
- the memory sub-system controller 115 can be responsible for other operations such as wear leveling operations, garbage collection operations, error detection and error-correcting code (ECC) operations, encryption operations, caching operations, and address translations between a logical address (e.g., a logical block address (LBA), namespace) and a physical address (e.g., physical block address) that are associated with the memory devices 130 .
- the memory sub-system controller 115 can further include host interface circuitry to communicate with the host system 120 via the physical host interface. The host interface circuitry can convert the commands received from the host system into command instructions to access the memory devices 130 as well as convert responses associated with the memory devices 130 into information for the host system 120 .
- the memory sub-system 110 can also include additional circuitry or components that are not illustrated.
- the memory sub-system 110 can include a cache or buffer (e.g., DRAM) and address circuitry (e.g., a row decoder and a column decoder) that can receive an address from the memory sub-system controller 115 and decode the address to access the memory devices 130 .
- a cache or buffer e.g., DRAM
- address circuitry e.g., a row decoder and a column decoder
- the memory devices 130 include local media controllers 135 that operate in conjunction with memory sub-system controller 115 to execute operations on one or more memory cells of the memory devices 130 .
- An external controller e.g., memory sub-system controller 115
- memory sub-system 110 is a managed memory device, which is a raw memory device 130 having control logic (e.g., local controller 132 ) on the die and a controller (e.g., memory sub-system controller 115 ) for media management within the same memory device package.
- control logic e.g., local controller 132
- controller e.g., memory sub-system controller 115
- An example of a managed memory device is a managed NAND (MNAND) device.
- MNAND managed NAND
- the memory sub-system controller 115 can implement a pass through voltage manager 134 that can perform a read operation and a program verify operation (i.e., a read sub-operation of the program verify operation) on a target wordline (WLn) using an asymmetric pass through voltage scheme.
- the pass through voltage manager 134 causes a first pass through voltage (Vpass1) to be applied to WLn ⁇ 1 and a second pass through voltage (Vpass2) to be applied to WLn+1 (also referred to as a second wordline adjacent to the target wordline), where Vpass1 is less than Vpass2.
- the pass through voltage manager 134 causes application of Vpass1 to WLn ⁇ 1 and Vpass2 to WLn+1 when read voltages above a lowest read voltage (R1) are applied to the target wordline WLn (i.e., asymmetric pass through voltages for R2, R3, R4 . . . Rfinal).
- the pass through voltage manager 134 causes application of a symmetric pass through voltage (Vpass) to both WLn ⁇ 1 and WLn+1 when the lowest read voltage (R1) is applied to the target wordline (i.e., a symmetric pass through voltage (Vpass) is applied to both WLn ⁇ 1 and WLn+1 for R1).
- a sensed data value e.g., a current level
- completion of the memory access operation i.e., completion of the read operation of the target wordline.
- FIG. 1 B is a simplified block diagram of a first apparatus, in the form of a memory device 130 , in communication with a second apparatus, in the form of a memory sub-system controller 115 of a memory sub-system (e.g., memory sub-system 110 of FIG. 1 ), according to an embodiment.
- a memory sub-system controller 115 of a memory sub-system (e.g., memory sub-system 110 of FIG. 1 ), according to an embodiment.
- Some examples of electronic systems include personal computers, personal digital assistants (PDAs), digital cameras, digital media players, digital recorders, games, appliances, vehicles, wireless devices, mobile telephones and the like.
- the memory sub-system controller 115 e.g., a controller external to the memory device 130
- Memory device 130 includes an array of memory cells 104 logically arranged in rows and columns. Memory cells of a logical row are connected to the same access line (e.g., a wordline) while memory cells of a logical column are selectively connected to the same data line (e.g., a bitline). A single access line may be associated with more than one logical row of memory cells and a single data line may be associated with more than one logical column. Memory cells (not shown in FIG. 1 B ) of at least a portion of array of memory cells 104 are capable of being programmed to one of at least two target data states.
- Row decode circuitry 108 and column decode circuitry 109 are provided to decode address signals. Address signals are received and decoded to access the array of memory cells 104 .
- Memory device 130 also includes input/output (I/O) control circuitry 160 to manage input of commands, addresses and data to the memory device 130 as well as output of data and status information from the memory device 130 .
- An address page buffer 114 is in communication with I/O control circuitry 160 and row decode circuitry 108 and column decode circuitry 109 to latch the address signals prior to decoding.
- a command page buffer 124 is in communication with I/O control circuitry 160 and local media controller 135 to latch incoming commands.
- a controller controls access to the array of memory cells 104 in response to the commands and generates status information for the external memory sub-system controller 115 , i.e., the local media controller 135 is configured to perform access operations (e.g., read operations, programming operations and/or erase operations) on the array of memory cells 104 .
- the local media controller 135 is in communication with row decode circuitry 108 and column decode circuitry 109 to control the row decode circuitry 108 and column decode circuitry 109 in response to the addresses.
- local media controller 135 includes the pass through voltage manager 134 , which can implement the corrective program verify operation on memory device 130 .
- the local media controller 135 is also in communication with a cache register 118 .
- Cache register 118 latches data, either incoming or outgoing, as directed by the local media controller 135 to temporarily store data while the array of memory cells 104 is busy writing or reading, respectively, other data.
- data may be passed from the cache register 118 to the data register 170 for transfer to the array of memory cells 104 ; then new data may be latched in the cache register 118 from the I/O control circuitry 160 .
- data may be passed from the cache register 118 to the I/O control circuitry 160 for output to the memory sub-system controller 115 ; then new data may be passed from the data register 170 to the cache register 118 .
- the cache register 118 and/or the data register 170 may form (e.g., may form a portion of) a page buffer of the memory device 130 .
- a page buffer may further include sensing devices (not shown in FIG. 1 B ) to sense a data state of a memory cell of the array of memory cells 204 , e.g., by sensing a state of a data line connected to that memory cell.
- a status register 122 may be in communication with I/O control circuitry 160 and the local memory controller 135 to latch the status information for output to the memory sub-system controller 115 .
- Memory device 130 receives control signals at the memory sub-system controller 115 from the local media controller 135 over a control link 132 .
- the control signals can include a chip enable signal CE #, a command latch enable signal CLE, an address latch enable signal ALE, a write enable signal WE #, a read enable signal RE #, and a write protect signal WP #. Additional or alternative control signals (not shown) may be further received over control link 132 depending upon the nature of the memory device 130 .
- memory device 130 receives command signals (which represent commands), address signals (which represent addresses), and data signals (which represent data) from the memory sub-system controller 115 over a multiplexed input/output (I/O) bus 136 and outputs data to the memory sub-system controller 115 over I/O bus 136 .
- command signals which represent commands
- address signals which represent addresses
- data signals which represent data
- the commands may be received over input/output (I/O) pins [7:0] of I/O bus 136 at I/O control circuitry 160 and may then be written into command page buffer 124 .
- the addresses may be received over input/output (I/O) pins [7:0] of I/O bus 136 at I/O control circuitry 160 and may then be written into address page buffer 114 .
- the data may be received over input/output (I/O) pins [7:0] for an 8-bit device or input/output (I/O) pins [15:0] for a 16-bit device at I/O control circuitry 160 and then may be written into cache register 118 .
- the data may be subsequently written into data register 170 for programming the array of memory cells 104 .
- cache register 118 may be omitted, and the data may be written directly into data register 170 .
- Data may also be output over input/output (I/O) pins [7:0] for an 8-bit device or input/output (I/O) pins [15:0] for a 16-bit device.
- I/O pins they may include any conductive node providing for electrical connection to the memory device 130 by an external device (e.g., the memory sub-system controller 115 ), such as conductive pads or conductive bumps as are commonly used.
- FIGS. 1 A- 1 B has been simplified. It should be recognized that the functionality of the various block components described with reference to FIGS. 1 A- 1 B may not necessarily be segregated to distinct components or component portions of an integrated circuit device. For example, a single component or component portion of an integrated circuit device could be adapted to perform the functionality of more than one block component of FIGS. 1 A- 1 B . Alternatively, one or more components or component portions of an integrated circuit device could be combined to perform the functionality of a single block component of FIGS. 1 A- 1 B . Additionally, while specific I/O pins are described in accordance with popular conventions for receipt and output of the various signals, it is noted that other combinations or numbers of I/O pins (or other I/O node structures) may be used in the various embodiments.
- FIGS. 2 A- 2 C are diagrams of portions of an example array of memory cells included in a memory device, in accordance with some embodiments of the present disclosure.
- FIG. 2 A is a schematic of a portion of an array of memory cells 200 A as could be used in a memory device (e.g., as a portion of array of memory cells 104 ).
- Memory array 200 A includes access lines, such as wordlines 202 0 to 202 N , and a data line, such as bitline 204 .
- the wordlines 202 may be connected to global access lines (e.g., global wordlines), not shown in FIG. 2 A , in a many-to-one relationship.
- memory array 200 A may be formed over a semiconductor that, for example, may be conductively doped to have a conductivity type, such as a p-type conductivity, e.g., to form a p-well, or an n-type conductivity, e.g., to form an n-well.
- a conductivity type such as a p-type conductivity, e.g., to form a p-well, or an n-type conductivity, e.g., to form an n-well.
- Memory array 200 A can be arranged in rows each corresponding to a respective wordline 202 and columns each corresponding to a respective bitline 204 . Rows of memory cells 208 can be divided into one or more groups of physical pages of memory cells 208 , and physical pages of memory cells 208 can include every other memory cell 208 commonly connected to a given wordline 202 .
- memory cells 208 commonly connected to wordline 202 N and selectively connected to even bitlines 204 may be one physical page of memory cells 208 (e.g., even memory cells) while memory cells 208 commonly connected to wordline 202 N and selectively connected to odd bitlines 204 (e.g., bitlines 204 1 , 204 3 , 204 5 , etc.) may be another physical page of memory cells 208 (e.g., odd memory cells).
- bitlines 204 3 - 204 5 are not explicitly depicted in FIG.
- bitlines 204 of the array of memory cells 200 A may be numbered consecutively from bitline 204 0 to bitline 204 M .
- Other groupings of memory cells 208 commonly connected to a given wordline 202 may also define a physical page of memory cells 208 .
- all memory cells commonly connected to a given wordline might be deemed a physical page of memory cells.
- the portion of a physical page of memory cells (which, in some embodiments, could still be the entire row) that is read during a single read operation or programmed during a single programming operation (e.g., an upper or lower page of memory cells) might be deemed a logical page of memory cells.
- a block of memory cells may include those memory cells that are configured to be erased together, such as all memory cells connected to wordlines 202 0 - 202 N (e.g., all strings 206 sharing common wordlines 202 ).
- a reference to a page of memory cells herein refers to the memory cells of a logical page of memory cells.
- Each column can include a string of series-connected memory cells (e.g., non-volatile memory cells), such as one of strings 206 0 to 206 M .
- Each string 206 can be connected (e.g., selectively connected) to a source line 216 (SRC) and can include memory cells 208 0 to 208 N .
- the memory cells 208 of each string 206 can be connected in series between a select gate 210 , such as one of the select gates 210 0 to 210 M , and a select gate 212 , such as one of the select gates 212 0 to 212 M .
- the select gates 210 0 to 210 M are source-side select gates (SGS) and the select gates 212 0 to 212 M are drain-side select gates.
- Select gates 210 0 to 210 M can be connected to a select line 214 (e.g., source-side select line) and select gates 212 0 to 212 M can be connected to a select line 215 (e.g., drain-side select line).
- the select gates 210 and 212 might represent a plurality of select gates connected in series, with each select gate in series configured to receive a same or independent control signal.
- a source of each select gate 210 can be connected to SRC 216 , and a drain of each select gate 210 can be connected to a memory cell 208 0 of the corresponding string 206 . Therefore, each select gate 210 can be configured to selectively connect a corresponding string 206 to SRC 216 .
- a control gate of each select gate 210 can be connected to select line 214 .
- the drain of each select gate 212 can be connected to the bitline 204 for the corresponding string 206 .
- the source of each select gate 212 can be connected to a memory cell 208 N of the corresponding string 206 . Therefore, each select gate 212 might be configured to selectively connect a corresponding string 206 to the bitline 204 .
- a control gate of each select gate 212 can be connected to select line 215 .
- the memory array in FIG. 2 A is a three-dimensional memory array, in which the strings 206 extend substantially perpendicular to a plane containing SRC 216 and to a plane containing a plurality of bitlines 204 that can be substantially parallel to the plane containing SRC 216 .
- FIG. 2 B is another schematic of a portion of an array of memory cells 200 B (e.g., a portion of the array of memory cells 104 ) arranged in a three-dimensional memory array structure.
- the three-dimensional memory array 200 B may incorporate vertical structures which may include semiconductor pillars where a portion of a pillar may act as a channel region of the memory cells of strings 206 .
- the strings 206 may be each selectively connected to a bitline 204 0 - 204 M by a select gate 212 and to the SRC 216 by a select gate 210 . Multiple strings 206 can be selectively connected to the same bitline 204 .
- Subsets of strings 206 can be connected to their respective bitlines 204 by biasing the select lines 215 0 - 215 L to selectively activate particular select gates 212 each between a string 206 and a bitline 204 .
- the select gates 210 can be activated by biasing the select line 214 .
- Each wordline 202 may be connected to multiple rows of memory cells of the memory array 200 B. Rows of memory cells that are commonly connected to each other by a particular wordline 202 may collectively be referred to as tiers.
- FIG. 2 C depicts groupings of NAND strings 206 into blocks of memory cells 250 , e.g., blocks of memory cells 250 0 - 250 L .
- Blocks of memory cells 250 can be groupings of memory cells 208 that can be erased together in a single erase operation, sometimes referred to as erase blocks.
- Each block of memory cells 250 can represent those NAND strings 206 commonly associated with a single select line 215 , e.g., select line 215 0 .
- the source 216 for the block of memory cells 250 0 can be a same source as the source 216 for the block of memory cells 250 L .
- each block of memory cells 250 0 - 250 L can be commonly selectively connected to the source 216 .
- Access lines 202 and select lines 214 and 215 of one block of memory cells 250 can have no direct connection to access lines 202 and select lines 214 and 215 , respectively, of any other block of memory cells of the blocks of memory cells 250 0 - 250 L .
- the bitlines 204 0 - 204 M can be connected (e.g., selectively connected) to a buffer portion 240 , which can be a portion of the page buffer 152 of the memory device 130 .
- the buffer portion 240 can correspond to a memory plane (e.g., the set of blocks of memory cells 250 0 - 250 L ).
- the buffer portion 240 can include sense circuits (which can include sense amplifiers) for sensing data values indicated on respective bitlines 204 .
- FIG. 2 D is a diagram of a portion of an array of memory cells 200 D (e.g., a portion of the array of memory cells 104 ).
- Channel regions (e.g., semiconductor pillars) 238 00 and 238 01 represent the channel regions of different strings of series-connected memory cells (e.g., strings 206 of FIGS. 2 A- 2 C ) selectively connected to the bitline 204 0 .
- channel regions 238 10 and 238 11 represent the channel regions of different strings of series-connected memory cells (e.g., NAND strings 206 of FIGS. 2 A- 2 C ) selectively connected to the bitline 204 1 .
- a memory cell (not depicted in FIG.
- FIGS. 2 A- 2 C may be formed at each intersection of an wordline 202 and a channel region 238 , and the memory cells corresponding to a single channel region 238 may collectively form a string of series-connected memory cells (e.g., a string 206 of FIGS. 2 A- 2 C ). Additional features might be common in such structures, such as dummy wordlines, segmented channel regions with interposed conductive regions, etc.
- FIG. 3 is a block schematic of a portion of an array of memory cells 300 as could be used in a memory of the type described with reference to FIG. 1 B .
- the array of memory cells 300 is depicted as having four memory planes 350 (e.g., memory planes 350 0 - 350 3 ), each in communication with a respective buffer portion 240 , which can collectively form a page buffer 352 . While four memory planes 350 are depicted, other numbers of memory planes 350 can be commonly in communication with a page buffer 352 .
- Each memory plane 350 is depicted to include L+1 blocks of memory cells 250 (e.g., blocks of memory cells 250 0 - 250 L ).
- FIG. 4 illustrates example arrangements of a target wordline (WLn) and corresponding adjacent or neighboring wordlines (WLn ⁇ 1 and WLn+1) during execution of a read operation ( 401 ) and execution of a program verify operation ( 402 ), according to embodiments of the present disclosure.
- a read operation is executed to read a set of target cells associated with a selected or target wordline (WLn) including application of asymmetric pass through voltage levels to WLn ⁇ 1 and WLn+1.
- Vread read voltage
- Vpass1 first pass through voltage
- Vpass2 second pass through voltage
- a symmetric pass through voltage is applied to both WLn ⁇ 1 and WLn+1 (i.e., the same Vpass is applied to WLn ⁇ 1 and WLn+1) and the asymmetric pass through voltages (Vpass1 applied to WLn ⁇ 1 and Vpass2 applied to WLn+1) for all other read levels (e.g., R2, R3 . . . R15 for a QLC memory device).
- the asymmetric pass through voltages (Vpass1 applied to WLn ⁇ 1 and Vpass2 applied to WLn+1) is applied for all read levels of WLn (e.g., R1, R2, R3 . . . R15 for a QLC memory device).
- processing logic causes application of Vpass1 to WLn ⁇ 1 and Vpass2 to WL+1 for all read levels of WLn.
- a program verify operation is executed to verify a programming of a set of target cells associated with the selected or target wordline (WLn) including application of the asymmetric pass through voltage levels to WLn ⁇ 1 and WLn+1.
- a read sub-operation of the program verify operation during application of a read voltage (Vread_pv) to the target wordline, a first pass through voltage (Vpass1) is applied to WLn ⁇ 1 and a second pass through voltage (Vpass2) is applied to WLn+1.
- Vpass1 is determined in accordance with the following expression:
- V pass1 V pass2 ⁇ V pass_offset
- Vpass_offset is in a range of approximately 0.1V to approximately 1.5V.
- Vpass2 can be in a range of approximately 6.0V to approximately 7.5V and Vpass1 can be in a range of approximately 4.5V to 6.0V.
- Vpass2 can be approximately 6.5V
- Vpass_offset can be approximately 0.7V
- Vpass1 can be approximately 5.8V.
- the pass through voltage applied to the first wordline (i.e., WLn ⁇ 1) adjacent to the target wordline (WLn) is lower than the pass through voltage applied to a second wordline (WLn+1) adjacent to the target wordline during the execution of a read operation on the target wordline and the execution of a program verify operation on the target wordline, where the order of programming is WLn ⁇ 1 followed by WLn followed by WLn+1, regardless of the “drain to source” or “source to drain” program scheme.
- the application of Vpass1 to WLn ⁇ 1 that is lower than Vpass applied to WLn+1 increases the read window budget by reducing the C2C coupling on WLn when programming WLn+1.
- symmetric pass through voltages i.e., the same Vpass is applied to WLn ⁇ 1 and WLn+1
- a lowest read level i.e., R1
- a lowest program verify level i.e., PV1
- asymmetric pass through voltages are applied to WLn ⁇ 1 and WLn+1 during execution of a read operation or a program verify operation on all other read levels and program verify levels above the lowest read level/program verify level (e.g., R2/PV2, R3/PV3 . . . R15/PV15 for a QLC memory device).
- a sensed data value e.g., a current level
- completion of the memory access operation i.e., completion of the read operation of the target wordline.
- FIG. 5 illustrates a graph plotting a level or percent of C2C interference as a function of a threshold volt (Vt) shift of an aggressor wordline (WLn+1), according to embodiments of the present disclosure.
- the C2C interference is advantageously reduced when applying an asymmetric Vpass to adjacent wordlines during a read operation or a program verify operation ( 501 ) as compared to application of a symmetric Vpass to the adjacent wordlines during a read operation or a program verify operation ( 502 ).
- the asymmetric Vpass includes the application of a first pass through voltage (Vpass1) to WLn ⁇ 1 that is lower than a second pass through voltage (Vpass2) applied to WLn+1 during a read operation or a program verify operation executed on a target wordline (WLn).
- Vpass1 first pass through voltage
- Vpass2 second pass through voltage
- WLn+1 target wordline
- the C2C interference level (percentage) corresponding to the asymmetric pass through voltage process during a read operation or a program verify operation of the present disclosure is improved (i.e., Vpass1 applied to WLn ⁇ 1 ⁇ Vpass2 applied to WLn+1), as compared to the symmetric approach (i.e., the same Vpass applied to both WLn ⁇ 1 and WLn+1 for all read and program verify levels).
- FIG. 6 illustrates example arrangements of a target wordline (WLn) and corresponding neighboring wordlines (WLn ⁇ 1 and WLn+1) during execution of a read operation or a program verify operation with an asymmetric pass through voltage applied to the neighboring wordlines during a pre-aggression stage 601 and a post-aggression stage 602 , according to embodiments of the present disclosure.
- FIG. 6 illustrates a drain-to-source programming scheme including a channel 603 .
- application of asymmetric pass through voltages to WLn ⁇ 1 and WLn+1 during a read operation or read sub-operation of program verify operation causes a relative change in effective length ( ⁇ Leff/Leff) to be reduced. The reduction in the relative change in effective length results in a reduction of short channel effects and a lower threshold voltage change related to the aggression and a corresponding lowering of the C2C interference.
- FIG. 7 is a flow diagram of an example method 700 to perform a memory access operation (e.g., a read operation or a program verify operation) of a target wordline (WLn) including application of asymmetric pass through voltage levels to neighboring wordlines (WLn ⁇ 1 and WLn+1) to reduce C2C interference, in accordance with some embodiments of the present disclosure.
- the method 700 can be performed by processing logic that can include hardware (e.g., processing device, circuitry, dedicated logic, programmable logic, microcode, hardware of a device, integrated circuit, etc.), software (e.g., instructions run or executed on a processing device), or a combination thereof.
- the method 700 is performed by the pass through voltage manager 134 of FIGS. 1 A- 1 B .
- an operation is initiated with respect to a set of target memory cells.
- processing logic e.g., the pass through voltage manager of FIGS. 1 A- 1 B
- a memory access operation can be initiated to read the set of target memory cells of a target wordline (WLn).
- the memory access operation can be initiated in response to a request received by a memory sub-system controller (e.g., the memory sub-system controller 115 of FIGS. 1 A- 1 B ) from a host system.
- a memory sub-system controller e.g., the memory sub-system controller 115 of FIGS. 1 A- 1 B
- Each target memory cell of the set of target memory cells is connected to the target wordline (WLn).
- the memory access operation can include a read operation or a program verify operation including a read sub-operation.
- a voltage is applied.
- the processing logic can cause, during the memory access operation, a read voltage level (Vread) to be applied to the target wordline.
- the read voltage level (Vread) can correspond to a programmed level of the target wordline (e.g., R1, R2, R3 . . . Rfinal, where R1 is the lowest read voltage level and Rfinal is a highest read voltage level or PV1, PV2, PV3 . . . PVfinal, where PV1 is the lowest read voltage level of a read sub-operation of a program verify operation and PVfinal is a highster read voltage level of a read sub-operation of a program verify operation).
- a programmed level of the target wordline e.g., R1, R2, R3 . . . Rfinal, where R1 is the lowest read voltage level and Rfinal is a highest read voltage level or PV1, PV2, PV3 . . . PVfinal, where PV1 is the lowest read voltage level of a read sub-operation of a program verify operation
- pass through voltages are applied.
- the processing logic can cause, during the memory access operation, a first pass through voltage level to be applied to a first wordline adjacent to the target wordline and a second pass through voltage level to be applied to a second wordline adjacent to the target wordline, where the first pass through voltage level is less than the second pass through voltage level.
- the first pass through voltage level (Vpass1) applied to the first wordline (WLn ⁇ 1) is equal to the second pass through voltage level (Vpass2) reduced by an offset value (Vpass_offset).
- Vpass_offset is in a range of approximately 0.1V to approximately 1.5V
- Vpass2 can be in a range of approximately 6.0V to approximately 7.5V
- Vpass1 can be in a range of approximately 4.5V to 6.0V.
- Vpass2 can be approximately 6.5V
- Vpass_offset can be approximately 0.7V
- Vpass1 can be approximately 5.8V.
- a sensed data value (e.g., a current level) associated with the target wordline is used to determine completion of the memory access operation (i.e., confirmation that the target memory cells being read have been turned on and the read operation is complete).
- FIG. 8 illustrates an example machine of a computer system 800 within which a set of instructions, for causing the machine to perform any one or more of the methodologies discussed herein, can be executed.
- the computer system 800 can correspond to a host system (e.g., the host system 120 of FIG. 1 A ) that includes, is coupled to, or utilizes a memory sub-system (e.g., the memory sub-system 110 of FIG. 1 A ) or can be used to perform the operations of a controller (e.g., to execute an operating system to perform operations corresponding to the pass through voltage manager 134 of FIG. 1 A and FIG. 1 B ).
- a host system e.g., the host system 120 of FIG. 1 A
- a memory sub-system e.g., the memory sub-system 110 of FIG. 1 A
- a controller e.g., to execute an operating system to perform operations corresponding to the pass through voltage manager 134 of FIG. 1 A and FIG. 1 B ).
- the machine can be connected (e.g., networked) to other machines in a LAN, an intranet, an extranet, and/or the Internet.
- the machine can operate in the capacity of a server or a client machine in client-server network environment, as a peer machine in a peer-to-peer (or distributed) network environment, or as a server or a client machine in a cloud computing infrastructure or environment.
- the machine can be a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a memory cellular telephone, a web appliance, a server, a network router, a switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
- PC personal computer
- PDA Personal Digital Assistant
- STB set-top box
- memory cellular telephone a web appliance
- server a server
- network router a network router
- switch or bridge any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
- machine shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
- the example computer system 800 includes a processing device 802 , a main memory 804 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or RDRAM, etc.), a static memory 806 (e.g., flash memory, static random access memory (SRAM), etc.), and a data storage system 818 , which communicate with each other via a bus 830 .
- main memory 804 e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or RDRAM, etc.
- DRAM dynamic random access memory
- SDRAM synchronous DRAM
- RDRAM RDRAM
- static memory 806 e.g., flash memory, static random access memory (SRAM), etc.
- SRAM static random access memory
- Processing device 802 represents one or more general-purpose processing devices such as a microprocessor, a central processing unit, or the like. More particularly, the processing device can be a complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, or a processor implementing other instruction sets, or processors implementing a combination of instruction sets. Processing device 802 can also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like. The processing device 602 is configured to execute instructions 826 for performing the operations and steps discussed herein.
- the computer system 800 can further include a network interface device 808 to communicate over the network 820 .
- the data storage system 818 can include a machine-readable storage medium 824 (also known as a computer-readable medium) on which is stored one or more sets of instructions 826 or software embodying any one or more of the methodologies or functions described herein.
- the instructions 826 can also reside, completely or at least partially, within the main memory 804 and/or within the processing device 802 during execution thereof by the computer system 800 , the main memory 804 and the processing device 802 also constituting machine-readable storage media.
- the machine-readable storage medium 824 , data storage system 818 , and/or main memory 804 can correspond to the memory sub-system 110 of FIG. 1 A .
- the instructions 826 include instructions to implement functionality corresponding to a CR component (e.g., the pass through voltage manager 134 of FIG. 1 A and FIG. 1 B ).
- a CR component e.g., the pass through voltage manager 134 of FIG. 1 A and FIG. 1 B
- the machine-readable storage medium 824 is shown in an example embodiment to be a single medium, the term “machine-readable storage medium” should be taken to include a single medium or multiple media that store the one or more sets of instructions.
- the term “machine-readable storage medium” shall also be taken to include any medium that is capable of storing or encoding a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure.
- the term “machine-readable storage medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical media, and magnetic media.
- the present disclosure also relates to an apparatus for performing the operations herein.
- This apparatus can be specially constructed for the intended purposes, or it can include a general purpose computer selectively activated or reconfigured by a computer program stored in the computer.
- a computer program can be stored in a computer readable storage medium, such as any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, each coupled to a computer system bus.
- the present disclosure can be provided as a computer program product, or software, that can include a machine-readable medium having stored thereon instructions, which can be used to program a computer system (or other electronic devices) to perform a process according to the present disclosure.
- a machine-readable medium includes any mechanism for storing information in a form readable by a machine (e.g., a computer).
- a machine-readable (e.g., computer-readable) medium includes a machine (e.g., a computer) readable storage medium such as a read only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory components, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Read Only Memory (AREA)
Abstract
A memory access operation is initiated to read a set of target memory cells of a target wordline of the memory device. During the memory access operation, a read voltage level is caused to be applied to the target wordline. During the memory access operation, a first pass through voltage level is caused to be applied to a first wordline adjacent to the target wordline. During the memory access operation, a second pass through voltage is caused to be applied to a second wordline adjacent to the target wordline, wherein the first pass through voltage level is less than the second pass through voltage level.
Description
- This application claims the benefit of U.S. Provisional Application No. 63/402,258, titled “Asymmetric Pass Through Voltage for Reduction of Cell-to-Cell Interference,” filed Aug. 30, 2022, which is hereby incorporated herein by reference in its entirety.
- Embodiments of the disclosure relate generally to memory sub-systems, and more specifically, relate to performing read and program verify operations using an asymmetric pass through voltage for reduction of cell-to-cell interference.
- A memory sub-system can include one or more memory devices that store data. The memory devices can be, for example, non-volatile memory devices and volatile memory devices. In general, a host system can utilize a memory sub-system to store data at the memory devices and to retrieve data from the memory devices.
- The disclosure will be understood more fully from the detailed description given below and from the accompanying drawings of various embodiments of the disclosure. The drawings, however, should not be taken to limit the disclosure to the specific embodiments, but are for explanation and understanding only.
-
FIG. 1A illustrates an example computing system that includes a memory sub-system, in accordance with one or more embodiments of the present disclosure. -
FIG. 1B is a block diagram of a memory device in communication with a memory sub-system controller of a memory sub-system, in accordance with one or more embodiments of the present disclosure. -
FIG. 2A-2D are schematics of portions of an array of memory cells as could be used in a memory of the type described with reference toFIG. 1B , in accordance with one or more embodiments of the present disclosure. -
FIG. 3 is a block schematic of a portion of an array of memory cells as could be used in a memory of the type described with reference toFIG. 1B , in accordance with one or more embodiments of the present disclosure. -
FIG. 4 illustrates example arrangements of a target wordline and corresponding adjacent or neighboring wordlines during execution of a read operation and execution of a program verify operation, in accordance with one or more embodiments of the present disclosure. -
FIG. 5 illustrates a graph plotting a level or percent of cell-to-cell interference as a function of a threshold volt shift of an aggressor wordline, in accordance with one or more embodiments of the present disclosure. -
FIG. 6 illustrates example arrangements of a target wordline and corresponding adjacent wordlines during execution of a read operation or a program verify operation with an asymmetric pass through voltage applied to the neighboring wordlines during a pre-aggression stage and a post-aggression stage, in accordance with one or more embodiments of the present disclosure. -
FIG. 7 is a flow diagram of an example method to perform a memory access operation (e.g., a read operation or a program verify operation) of a target wordline including application of asymmetric pass through voltage levels to adjacent wordlines to reduce cell-to-cell interference, in accordance with one or more embodiments of the present disclosure. -
FIG. 8 is a block diagram of an example computer system in which embodiments of the present disclosure may operate. - Aspects of the present disclosure are directed to execution of read operations and program verify operations using asymmetric pass through voltage levels for adjacent or neighboring wordlines to reduce cell-to-cell interference. A memory sub-system can be a storage device, a memory module, or a combination of a storage device and memory module. Examples of storage devices and memory modules are described below in conjunction with
FIGS. 1A-1B . In general, a host system can utilize a memory sub-system that includes one or more components, such as memory devices that store data. The host system can provide data to be stored at the memory sub-system and can request data to be retrieved from the memory sub-system. - A memory sub-system can include high density non-volatile memory devices where retention of data is desired when no power is supplied to the memory device. One example of non-volatile memory devices is a negative-and (NAND) memory device. Other examples of non-volatile memory devices are described below in conjunction with
FIGS. 1A-1B . A non-volatile memory device is a package of one or more dies. Each die includes one or more planes. For some types of non-volatile memory devices (e.g., NAND devices), each plane includes a set of physical blocks. Each block consists of a set of pages. Each page includes a set of memory cells. A memory cell is an electronic circuit that stores information. Depending on the memory cell type, a memory cell can store one or more bits of binary information, and has various logic states that correlate to the number of bits being stored. The logic states can be represented by binary values, such as “0” and “1”, or combinations of such values. - A memory device (e.g., a memory die) can include memory cells arranged in a two-dimensional or a three-dimensional grid. The memory cells are formed onto a silicon wafer in an array of columns and rows. The memory cells are joined by wordlines, which are conducting lines electrically connected to the control gates of the memory cells, and bitlines, which are conducting lines electrically connected to the drain electrodes of the memory cells. The intersection of a bitline and wordline constitutes the address of the memory cell. A block hereinafter refers to a unit of the memory device used to store data and can include a group of memory cells, a wordline group, a wordline, or individual memory cells. One or more blocks can be grouped together to form separate partitions (e.g., planes) of the memory device in order to allow concurrent operations to take place on each plane.
- Some memory devices can be three-dimensional (3D) memory devices (e.g., 3D NAND devices). For example, a 3D memory device can include memory cells that are placed between sets of layers including a pillar (e.g., polysilicon pillar), a tunnel oxide layer, a charge trap (CT) layer, and a dielectric (e.g. oxide) layer. A 3D memory device can have a “top deck” corresponding to a first side and a “bottom deck” corresponding to a second side. Without loss of generality, the first side can be a drain side and the second side can be a source side. For example, a 3D memory device can be a 3D replacement gate memory device having a replacement gate structure using wordline stacking.
- A memory cell (“cell”) can be programmed (written to) by applying a certain voltage to the cell, which results in an electric charge being held by the cell. For example, a voltage signal VCG that can be applied to a control electrode of the cell to open the cell to the flow of electric current across the cell, between a source electrode and a drain electrode. More specifically, for each individual cell (having a charge Q stored thereon) there can be a threshold control gate voltage Vt (also referred to as the “threshold voltage”) such that the source-drain electric current is low for the control gate voltage (VCG) being below the threshold voltage, VCG<Vt. The current increases substantially once the control gate voltage has exceeded the threshold voltage, VCG>Vt. Because the actual geometry of the electrodes and gates varies from cell to cell, the threshold voltages can be different even for cells implemented on the same die. The cells can, therefore, be characterized by a distribution P of the threshold voltages, P(Q,VT)=dW/dVT, where dW represents the probability that any given cell has its threshold voltage within the interval [Vt,Vt+dVt] when charge Q is placed on the cell.
- One type of cell is a single level cell (SLC), which stores 1 bit per cell and defines 2 logical states (“states”) (“1” or “L0” and “0” or “L1”) each corresponding to a respective VT level. For example, the “1” state can be an erased state and the “0” state can be a programmed state (L1). Another type of cell is a multi-level cell (MLC), which stores 2 bits per cell (1 bit for upper page (UP) data and 1 bit for lower page (LP) data) and defines 4 states (“11” or “L0”, “10” or “L1”, “01” or “L2” and “00” or “L3”) each corresponding to a respective VT level. For example, the “11” state can be an erased state and the “01”, “10” and “00” states can each be a respective programmed state. Another type of cell is a triple level cell (TLC), which stores 3 bits per cell (1 bit for UP data, 1 bit for LP data and 1 bit for extra page (XP) data) and defines 8 states (“111” or “L0”, “110” or “L1”, “101” or “L2”, “100” or “L3”, “011” or “L4”, “010” or “L5”, “001” or “L6”, and “000” or “L7”) each corresponding to a respective VT level. For example, the “111” state can be an erased state and each of the other states can be a respective programmed state. Another type of a cell is a quad-level cell (QLC), which stores 4 bits per cell (1 bit for UP data, 1 bit for LP data, 1 bit for XP data, and 1 bit for top page (TP) data) and defines 16 states L0-L15, where L0 corresponds to “1111” and L15 corresponds to “0000”. Another type of cell is a penta-level cell (PLC), which stores 5 bits per cell and defines 32 states. Other types of cells are also contemplated. Thus, an n-level cell can use 2n levels of charge to store n bits of information for n pages. A memory device can include one or more arrays of memory cells such as SLCs, MLCs, TLCs, QLCs, PLCs, etc. or any combination of such. For example, a memory device can include an SLC portion, and an MLC portion, a TLC portion, a QLC portion, or a PLC portion of cells.
- A memory device can exhibit threshold voltage distributions P(Q,VT) that are narrow compared with the working range of control voltages tolerated by the cells of the device. Accordingly, multiple non-overlapping distributions P(Qk,Vt) (“valleys”) can be fit into the working range allowing for storage and reliable detection of multiple values of the charge Qk, k=1, 2, 3 . . . The distributions (valleys) are interspersed with voltage intervals (“valley margins”) where none (or very few) of the cells of the device have their threshold voltages. Such valley margins can, therefore, be used to separate various charge states Qk—the logical state of the cell can be determined by detecting, during a read operation, between which two valley margins the respective threshold voltage VT of the cell resides. Specifically, the read operation can be performed by comparing the measured threshold voltage VT exhibited by the memory cell to one or more reference voltage levels corresponding to known valley margins (e.g., centers of the margins) of the memory device.
- A valley margin can also be referred to as a read window. For example, in a SLC cell, there is 1 read window that exists with respect to the 2 Vt distributions. As another example, in an MLC cell, there are 3 read windows that exist with respect to the 4 Vt distributions. As yet another example, in a TLC cell, there are 7 read windows that exist with respect to the 8 Vt distributions. Read window size generally decreases as the number of states increases. For example, the 1 read window for the SLC cell may be larger than each of the 3 read windows for the MLC cell, and each of the 3 read windows for the MLC cell may be larger than each of the 7 read windows for the TLC cell, etc. Read window budget (RWB) refers to the cumulative value of the read windows.
- One or more memory access operations can be performed with respect to the memory cells of the memory device. In an illustrative example, a memory cell programming operation, which can be performed in response to receiving a program or write command from the host, can involve sequentially applying programming voltage pulses to a selected or target wordline (WLn). In some implementations, the programming pulse voltage can be sequentially ramped up from the initial voltage value (e.g., 0V) to the final voltage value (e.g., VMAX). The unselected wordlines can, during the programming operation, be biased at a certain voltage, e.g., a pass through voltage, which is less than the programming voltage. After each programming pulse, or after a number of programming pulses, a program verify operation can be performed to determine if the threshold voltage of the one or more memory cells has increased to a desired programming level.
- Cells of a memory array that are selected for execution of a memory access operation (e.g., a read operation, a program operation, an erase operation) can be referred to target cells connected to a target wordline. The target cells can be adjacent to cells connected to at least one wordline neighboring the target wordline (“adjacent wordline”). For example, the at least one adjacent wordline can be a single wordline neighboring the target wordline or a pair of wordlines neighboring the target wordline. Illustratively, the target wordline can be referred to as an nth wordline (WLn), and the at least one adjacent wordline can include at least one of adjacent wordline n−1 (WLn−1) or adjacent wordline n+1 (WLn+1). For example, in a 3D memory device, the set of adjacent wordlines can include a wordline located directly above the target wordline and/or a wordline located directly below the target wordline.
- Each target cell has a respective group of adjacent cells. Each group of adjacent cells includes at least one cell that neighbors its respective target cell (e.g., one cell connected to WLn−1 and/or one cell connected to WLn+1). More specifically, each target cell can be connected to the same bitline as each cell of the respective group of adjacent cells, such that the target cell and the cells of the respective group of adjacent cells are within the same string. Accordingly, each group of adjacent cells can include a single adjacent cell, or a pair of adjacent cells connected to a same bitline as a respective target cell.
- A cell (e.g., NAND cell) of a block can store data in the form of the threshold voltage, which is a lowest voltage at which the cell can be activated (i.e., switched on). During a read operation and a program verify operation (i.e. a “target cell”), a read reference voltage (Vref) can be applied to an associated wordline, and a sense amplifier connected to an associated bitline can be used to sense whether the read cell has been switched on. More specifically, if Vref is higher than a threshold voltage (Vt) of the read cell, then the read cell is turned on. It is noted that only one cell per bitline can be read at a time. Since the cells of a bitline are connected in series, all transistors for cells of the bitline that are not being read (“unread cells”) need to be kept on during the read operation in order for the read output of the read cell to pass through to the sense amplifier. To achieve this, a pass through voltage (Vpass) can be applied to the wordlines of the unread cells to keep the unread cells on. More specifically, Vpass is a voltage that is chosen to be higher than all of the Vt's of the unread cells, but lower than a programming voltage, to ensure a memory cell is switched on. Although Vpass is a lower voltage than the programming voltage, the application of Vpass can affect (e.g., increase) the threshold voltage and thus alter logic states of the unread cells of the block via tunneling currents. This phenomenon is referred to as “read disturb.” As more read operations are applied within the block, the accumulation of read disturb over time can lead to read disturb errors.
- Cell-to-cell interference (also referred to as “C2C interference”) may exist in a memory array between the target cells and their respective groups of adjacent cells. Cell-to-cell interference can lead to lateral charge migration and Vt distribution shift. Cell-to-cell interference, in addition to intrinsic charge loss, can further lead to a widening of VT distributions. The VT distribution widening can cause RWB degradation, which can negatively affect memory device reliability. For example, RWB degradation can lead to an increase in the number of errors (e.g., bit errors) and/or error rate (e.g., bit error rate (BER)).
- Certain memory devices include scaling of the distance between gates of adjacent memory cells (i.e., pillar pitch). However, pillar pitch scaling can result in an increase in cell-to-cell (C2C) interference where a threshold voltage shift of one or more memory cells can influence the threshold voltage of one or more neighboring memory cells through parasitic capacitance-coupling effect. The increase of C2C interference disadvantageously results in an expansion of the corresponding threshold voltage distributions in order to accommodate all possible threshold voltages for a given state and a reduction in the read window budget (RWB) corresponding to the programming distributions associated with the various programming levels. The RWB can refer to the cumulative value (e.g., in voltage) of a number (e.g., seven) of distances (e.g., measured in voltage) between adjacent threshold voltage distributions at a particular BER.
- C2C interference can be increased due to multiple causes including a fringing field effect and a parasitic charge effect. A fringing field effect is the capacitive coupling of electrons programmed underneath the gate confinement of an aggressor memory cell (i.e., a memory cell being programmed). A parasitic charge effect is due to the continuity of the charge storage nitride film or charge trap (CT) layer throughout the pillar, whereby electrons are programmed into one or more inter-cell regions of the CT layer between adjacent memory cells (e.g., an aggressor memory cell and one or more victim memory cells). For example, the parasitic charge effect occurs during programming of an aggressor memory cell through the creation of electric fields due to application of a pass voltage (Vpass) on a victim memory cell (i.e., a memory cell that is not being programmed) and a program voltage (Vpgm) on the aggressor memory cell. These parasitic charges make it difficult to turn on the inter-wordline region, thereby increasing the threshold voltage of the victim memory cell after programming an adjacent aggressor memory cell.
- In the inter-cell region of the CT layer, parasitic charges are created near both the aggressor memory cell and the victim memory cell. However, because the parasitic charges near the victim memory cell are injected into the CT layer during the programming of the victim memory cell, only parasitic charges near the aggressor memory cell contribute to the increase of C2C interference. A program verify operation can be executed following each program pulse so these parasitic charges do not contribute to an upper tail of the victim memory cell. However, the parasitic charges near the aggressor memory cell cause the injection of electrons into the CT layer after the victim memory cell finishes programming, and therefore contributes to the undesirable C2C interference.
- C2C interference can result in the loss of RWB in view of the Vt difference between cells on a target wordline (WLn) and neighboring wordlines (e.g., WLn−1 and WLn+1). Specifically, cell-to-cell interference can cause the threshold voltage of the target wordline (WLn) to shift up, with a larger shift occurring as the threshold voltage of WLn+1 (i.e., an aggressor wordline) increases. A typical programming operation includes an order of programming of WLn−1, WLn, and WLn+1. For example, in a TLC memory device, a high C2C coupling occurs on WLn (i.e., the target or victim wordline) due to the prior programming of WLn−1, which limits the RWB.
- One approach to addressing the effects of the C2C coupling includes increasing the pass through voltage (Vpass) (i.e., a bias voltage) applied to the immediately adjacent wordlines (WLn−1 and WLn+1) during a memory access operation associated with the target wordline (WLn). In this approach, when executing a read operation or read sub-operation of a program verify operation on WLn, a symmetric or equal pass through voltage (Vpass) is applied to both of the immediately adjacent wordlines (WLn−1 and WLn+1). However, applying the same Vpass level (i.e., a symmetric Vpass level) to both WLn−1 and WLn+1 increases the read disturb effects. The increased read disturb and C2C coupling associated with the application of a symmetric Vpass to WLn−1 and WLn+1 increases the programming time (Tprog) and reduces the reliability of the memory device.
- Aspects of the present disclosure address the above and other deficiencies by performing a read operation and a program verify operation on a target wordline (WLn) using an asymmetric pass through voltage scheme. According to embodiments, during the read operation (i.e., a read operation or a read sub-operation of a program verify operation), a first pass through voltage (Vpass1) is applied to WLn−1 and a second pass through voltage (Vpass2) is applied to
WLn+ 1, where Vpass1 is less than Vpass2. In an embodiment, Vpass1 is set to a voltage level equal to Vpass2 reduced by an offset voltage level (Vpass_offset). - Advantageously, application of the asymmetric pass through voltages to the immediately adjacent wordlines (i.e., Vpass1 applied to WLn−1 and Vpass2 applied to
WLn+ 1; where Vpass1 is less than Vpass2) during a read operation or a read sub-operation of a program verify operation of a target wordline (WLn), a bottleneck of sensed current flowing (i.e., current sensed by a sensed amplifier) via a channel region associated with WLn moves toward WLn−1 and away from an aggression-side, which reduces a sensitivity of a victim memory cell (i.e., a memory cell that has not been programmed) to a threshold voltage (Vt) of the aggressor memory cell and lowers the cell-to-cell interference. - By applying a lower or reduced relative pass through voltage level (Vpass1) to the first wordline (WLn−1) as compared to the pass through voltage level (Vpass2) applied to the second wordline (WLn+1) during the execution of a read operation or a program verify operation on a target wordline (WLn), a change in an effective length of a channel region of the memory cell is reduced. The reduction of the relative change in the effective channel length reduces short channel effects and lowers the threshold voltage change associated with the programming aggression, which lowers the cell-to-cell interference. Further details performing read operations and program verify operations on a target wordline (WLn) using an asymmetric pass through voltage applied to the neighboring wordlines (Vpass1 applied to WLn−1 and Vpass2 applied to WLn+1) are described herein below with reference to
FIGS. 1-8 . - Advantages of the present disclosure include, but are not limited to, a reduction in C2C interference in a memory device. Furthermore, the application of asymmetric pass through voltages to neighboring wordlines during a read operation or read sub-operation of a program verify operation in accordance with the present disclosure can lead to improved RWB.
-
FIG. 1A illustrates anexample computing system 100 that includes amemory sub-system 110 in accordance with some embodiments of the present disclosure. Thememory sub-system 110 can include media, such as one or more volatile memory devices (e.g., memory device 140), one or more non-volatile memory devices (e.g., memory device 130), or a combination of such. - A
memory sub-system 110 can be a storage device, a memory module, or a combination of a storage device and memory module. Examples of a storage device include a solid-state drive (SSD), a flash drive, a universal serial bus (USB) flash drive, an embedded Multi-Media Controller (eMMC) drive, a Universal Flash Storage (UFS) drive, a secure digital (SD) card, and a hard disk drive (HDD). Examples of memory modules include a dual in-line memory module (DIMM), a small outline DIMM (SO-DIMM), and various types of non-volatile dual in-line memory modules (NVDIMMs). - The
computing system 100 can be a computing device such as a desktop computer, laptop computer, network server, mobile device, a vehicle (e.g., airplane, drone, train, automobile, or other conveyance), Internet of Things (IoT) enabled device, embedded computer (e.g., one included in a vehicle, industrial equipment, or a networked commercial device), or such computing device that includes memory and a processing device. - The
computing system 100 can include ahost system 120 that is coupled to one ormore memory sub-systems 110. In some embodiments, thehost system 120 is coupled tomultiple memory sub-systems 110 of different types.FIG. 1A illustrates one example of ahost system 120 coupled to onememory sub-system 110. As used herein, “coupled to” or “coupled with” generally refers to a connection between components, which can be an indirect communicative connection or direct communicative connection (e.g., without intervening components), whether wired or wireless, including connections such as electrical, optical, magnetic, etc. - The
host system 120 can include a processor chipset and a software stack executed by the processor chipset. The processor chipset can include one or more cores, one or more caches, a memory controller (e.g., NVDIMM controller), and a storage protocol controller (e.g., PCIe controller, SATA controller). Thehost system 120 uses thememory sub-system 110, for example, to write data to thememory sub-system 110 and read data from thememory sub-system 110. - The
host system 120 can be coupled to thememory sub-system 110 via a physical host interface. Examples of a physical host interface include, but are not limited to, a serial advanced technology attachment (SATA) interface, a peripheral component interconnect express (PCIe) interface, universal serial bus (USB) interface, Fibre Pillar, Serial Attached SCSI (SAS), a double data rate (DDR) memory bus, Small Computer System Interface (SCSI), a dual in-line memory module (DIMM) interface (e.g., DIMM socket interface that supports Double Data Rate (DDR)), etc. The physical host interface can be used to transmit data between thehost system 120 and thememory sub-system 110. Thehost system 120 can further utilize an NVM Express (NVMe) interface to access components (e.g., memory devices 130) when thememory sub-system 110 is coupled with thehost system 120 by the physical host interface (e.g., PCIe bus). The physical host interface can provide an interface for passing control, address, data, and other signals between thememory sub-system 110 and thehost system 120.FIG. 1A illustrates amemory sub-system 110 as an example. In general, thehost system 120 can access multiple memory sub-systems via a same communication connection, multiple separate communication connections, and/or a combination of communication connections. - The
memory devices - Some examples of non-volatile memory devices (e.g., memory device 130) include a negative-and (NAND) type flash memory and write-in-place memory, such as a three-dimensional cross-point (“3D cross-point”) memory device, which is a cross-point array of non-volatile memory cells. A cross-point array of non-volatile memory cells can perform bit storage based on a change of bulk resistance, in conjunction with a stackable cross-gridded data access array. Additionally, in contrast to many flash-based memories, cross-point non-volatile memory can perform a write in-place operation, where a non-volatile memory cell can be programmed without the non-volatile memory cell being previously erased. NAND type flash memory includes, for example, two-dimensional NAND (2D NAND) and three-dimensional NAND (3D NAND).
- Each of the
memory devices 130 can include one or more arrays of memory cells. One type of memory cell, for example, single level memory cells (SLC) can store one bit per memory cell. Other types of memory cells, such as multi-level memory cells (MLCs), triple level memory cells (TLCs), quad-level memory cells (QLCs), and penta-level memory cells (PLCs) can store multiple bits per memory cell. In some embodiments, each of thememory devices 130 can include one or more arrays of memory cells such as SLCs, MLCs, TLCs, QLCs, PLCs or any combination of such. In some embodiments, a particular memory device can include an SLC portion, and an MLC portion, a TLC portion, a QLC portion, or a PLC portion of memory cells. The memory cells of thememory devices 130 can be grouped as pages that can refer to a logical unit of the memory device used to store data. With some types of memory (e.g., NAND), pages can be grouped to form blocks. - Although non-volatile memory components such as a 3D cross-point array of non-volatile memory cells and NAND type flash memory (e.g., 2D NAND, 3D NAND) are described, the
memory device 130 can be based on any other type of non-volatile memory, such as read-only memory (ROM), phase change memory (PCM), self-selecting memory, other chalcogenide based memories, ferroelectric transistor random-access memory (FeTRAM), ferroelectric random access memory (FeRAM), magneto random access memory (MRAM), Spin Transfer Torque (STT)-MRAM, conductive bridging RAM (CBRAM), resistive random access memory (RRAM), oxide based RRAM (OxRAM), negative-or (NOR) flash memory, or electrically erasable programmable read-only memory (EEPROM). - A memory sub-system controller 115 (or
controller 115 for simplicity) can communicate with thememory devices 130 to perform operations such as reading data, writing data, or erasing data at thememory devices 130 and other such operations. Thememory sub-system controller 115 can include hardware such as one or more integrated circuits and/or discrete components, a buffer memory, or a combination thereof. The hardware can include a digital circuitry with dedicated (i.e., hard-coded) logic to perform the operations described herein. Thememory sub-system controller 115 can be a microcontroller, special purpose logic circuitry (e.g., a field programmable gate array (FPGA), an application specific integrated circuit (ASIC), etc.), or other suitable processor. - The
memory sub-system controller 115 can include a processing device, which includes one or more processors (e.g., processor 117), configured to execute instructions stored in alocal memory 119. In the illustrated example, thelocal memory 119 of thememory sub-system controller 115 includes an embedded memory configured to store instructions for performing various processes, operations, logic flows, and routines that control operation of thememory sub-system 110, including handling communications between thememory sub-system 110 and thehost system 120. - In some embodiments, the
local memory 119 can include memory page buffers storing memory pointers, fetched data, etc. Thelocal memory 119 can also include read-only memory (ROM) for storing micro-code. While theexample memory sub-system 110 inFIG. 1 has been illustrated as including thememory sub-system controller 115, in another embodiment of the present disclosure, amemory sub-system 110 does not include amemory sub-system controller 115, and can instead rely upon external control (e.g., provided by an external host, or by a processor or controller separate from the memory sub-system). - In general, the
memory sub-system controller 115 can receive commands or operations from thehost system 120 and can convert the commands or operations into instructions or appropriate commands to achieve the desired access to thememory devices 130. Thememory sub-system controller 115 can be responsible for other operations such as wear leveling operations, garbage collection operations, error detection and error-correcting code (ECC) operations, encryption operations, caching operations, and address translations between a logical address (e.g., a logical block address (LBA), namespace) and a physical address (e.g., physical block address) that are associated with thememory devices 130. Thememory sub-system controller 115 can further include host interface circuitry to communicate with thehost system 120 via the physical host interface. The host interface circuitry can convert the commands received from the host system into command instructions to access thememory devices 130 as well as convert responses associated with thememory devices 130 into information for thehost system 120. - The
memory sub-system 110 can also include additional circuitry or components that are not illustrated. In some embodiments, thememory sub-system 110 can include a cache or buffer (e.g., DRAM) and address circuitry (e.g., a row decoder and a column decoder) that can receive an address from thememory sub-system controller 115 and decode the address to access thememory devices 130. - In some embodiments, the
memory devices 130 includelocal media controllers 135 that operate in conjunction withmemory sub-system controller 115 to execute operations on one or more memory cells of thememory devices 130. An external controller (e.g., memory sub-system controller 115) can externally manage the memory device 130 (e.g., perform media management operations on the memory device 130). In some embodiments,memory sub-system 110 is a managed memory device, which is araw memory device 130 having control logic (e.g., local controller 132) on the die and a controller (e.g., memory sub-system controller 115) for media management within the same memory device package. An example of a managed memory device is a managed NAND (MNAND) device. - The
memory sub-system controller 115 can implement a pass throughvoltage manager 134 that can perform a read operation and a program verify operation (i.e., a read sub-operation of the program verify operation) on a target wordline (WLn) using an asymmetric pass through voltage scheme. According to embodiments, during application of a read voltage (for a read operation or a read sub-operation of a program verify operation), the pass throughvoltage manager 134 causes a first pass through voltage (Vpass1) to be applied to WLn−1 and a second pass through voltage (Vpass2) to be applied to WLn+1 (also referred to as a second wordline adjacent to the target wordline), where Vpass1 is less than Vpass2. In an embodiment, Vpass1 is set to a voltage level equal to Vpass2 reduced by an offset voltage level (Vpass_offset) (i.e., Vpass1=Vpass2−Vpass_offset). - In an embodiment, the pass through
voltage manager 134 causes application of Vpass1 to WLn−1 and Vpass2 to WLn+1 when read voltages above a lowest read voltage (R1) are applied to the target wordline WLn (i.e., asymmetric pass through voltages for R2, R3, R4 . . . Rfinal). In this embodiment, the pass throughvoltage manager 134 causes application of a symmetric pass through voltage (Vpass) to both WLn−1 and WLn+1 when the lowest read voltage (R1) is applied to the target wordline (i.e., a symmetric pass through voltage (Vpass) is applied to both WLn−1 and WLn+1 for R1). - In an embodiment, the pass through
voltage manager 134 causes application of Vpass1 to WLn−1 and Vpass2 to WLn+1 (i.e., Vpass1=Vpass2−Vpass_offset) when all read voltage levels (R1, R2, R3 . . . Rfinal) are applied to the target wordline WLn (i.e., asymmetric pass through voltages for all read levels of the read operation or read sub-operation of a program verify operation). According to embodiments, a sensed data value (e.g., a current level) associated with the target wordline is used to determine completion of the memory access operation (i.e., completion of the read operation of the target wordline). -
FIG. 1B is a simplified block diagram of a first apparatus, in the form of amemory device 130, in communication with a second apparatus, in the form of amemory sub-system controller 115 of a memory sub-system (e.g.,memory sub-system 110 ofFIG. 1 ), according to an embodiment. Some examples of electronic systems include personal computers, personal digital assistants (PDAs), digital cameras, digital media players, digital recorders, games, appliances, vehicles, wireless devices, mobile telephones and the like. The memory sub-system controller 115 (e.g., a controller external to the memory device 130), may be a memory controller or other external host device. -
Memory device 130 includes an array of memory cells 104 logically arranged in rows and columns. Memory cells of a logical row are connected to the same access line (e.g., a wordline) while memory cells of a logical column are selectively connected to the same data line (e.g., a bitline). A single access line may be associated with more than one logical row of memory cells and a single data line may be associated with more than one logical column. Memory cells (not shown inFIG. 1B ) of at least a portion of array of memory cells 104 are capable of being programmed to one of at least two target data states. - Row
decode circuitry 108 andcolumn decode circuitry 109 are provided to decode address signals. Address signals are received and decoded to access the array of memory cells 104.Memory device 130 also includes input/output (I/O) control circuitry 160 to manage input of commands, addresses and data to thememory device 130 as well as output of data and status information from thememory device 130. Anaddress page buffer 114 is in communication with I/O control circuitry 160 androw decode circuitry 108 andcolumn decode circuitry 109 to latch the address signals prior to decoding. Acommand page buffer 124 is in communication with I/O control circuitry 160 andlocal media controller 135 to latch incoming commands. - A controller (e.g., the
local media controller 135 internal to the memory device 130) controls access to the array of memory cells 104 in response to the commands and generates status information for the externalmemory sub-system controller 115, i.e., thelocal media controller 135 is configured to perform access operations (e.g., read operations, programming operations and/or erase operations) on the array of memory cells 104. Thelocal media controller 135 is in communication withrow decode circuitry 108 andcolumn decode circuitry 109 to control therow decode circuitry 108 andcolumn decode circuitry 109 in response to the addresses. In one embodiment,local media controller 135 includes the pass throughvoltage manager 134, which can implement the corrective program verify operation onmemory device 130. - The
local media controller 135 is also in communication with acache register 118. Cache register 118 latches data, either incoming or outgoing, as directed by thelocal media controller 135 to temporarily store data while the array of memory cells 104 is busy writing or reading, respectively, other data. During a program operation (e.g., write operation), data may be passed from thecache register 118 to the data register 170 for transfer to the array of memory cells 104; then new data may be latched in the cache register 118 from the I/O control circuitry 160. During a read operation, data may be passed from thecache register 118 to the I/O control circuitry 160 for output to thememory sub-system controller 115; then new data may be passed from the data register 170 to thecache register 118. Thecache register 118 and/or the data register 170 may form (e.g., may form a portion of) a page buffer of thememory device 130. A page buffer may further include sensing devices (not shown inFIG. 1B ) to sense a data state of a memory cell of the array ofmemory cells 204, e.g., by sensing a state of a data line connected to that memory cell. A status register 122 may be in communication with I/O control circuitry 160 and thelocal memory controller 135 to latch the status information for output to thememory sub-system controller 115. -
Memory device 130 receives control signals at thememory sub-system controller 115 from thelocal media controller 135 over a control link 132. For example, the control signals can include a chip enable signal CE #, a command latch enable signal CLE, an address latch enable signal ALE, a write enable signal WE #, a read enable signal RE #, and a write protect signal WP #. Additional or alternative control signals (not shown) may be further received over control link 132 depending upon the nature of thememory device 130. In one embodiment,memory device 130 receives command signals (which represent commands), address signals (which represent addresses), and data signals (which represent data) from thememory sub-system controller 115 over a multiplexed input/output (I/O) bus 136 and outputs data to thememory sub-system controller 115 over I/O bus 136. - For example, the commands may be received over input/output (I/O) pins [7:0] of I/O bus 136 at I/O control circuitry 160 and may then be written into
command page buffer 124. The addresses may be received over input/output (I/O) pins [7:0] of I/O bus 136 at I/O control circuitry 160 and may then be written intoaddress page buffer 114. The data may be received over input/output (I/O) pins [7:0] for an 8-bit device or input/output (I/O) pins [15:0] for a 16-bit device at I/O control circuitry 160 and then may be written intocache register 118. The data may be subsequently written into data register 170 for programming the array of memory cells 104. - In an embodiment,
cache register 118 may be omitted, and the data may be written directly intodata register 170. Data may also be output over input/output (I/O) pins [7:0] for an 8-bit device or input/output (I/O) pins [15:0] for a 16-bit device. Although reference may be made to I/O pins, they may include any conductive node providing for electrical connection to thememory device 130 by an external device (e.g., the memory sub-system controller 115), such as conductive pads or conductive bumps as are commonly used. - It will be appreciated by those skilled in the art that additional circuitry and signals can be provided, and that the
memory device 130 ofFIGS. 1A-1B has been simplified. It should be recognized that the functionality of the various block components described with reference toFIGS. 1A-1B may not necessarily be segregated to distinct components or component portions of an integrated circuit device. For example, a single component or component portion of an integrated circuit device could be adapted to perform the functionality of more than one block component ofFIGS. 1A-1B . Alternatively, one or more components or component portions of an integrated circuit device could be combined to perform the functionality of a single block component ofFIGS. 1A-1B . Additionally, while specific I/O pins are described in accordance with popular conventions for receipt and output of the various signals, it is noted that other combinations or numbers of I/O pins (or other I/O node structures) may be used in the various embodiments. -
FIGS. 2A-2C are diagrams of portions of an example array of memory cells included in a memory device, in accordance with some embodiments of the present disclosure. For example,FIG. 2A is a schematic of a portion of an array ofmemory cells 200A as could be used in a memory device (e.g., as a portion of array of memory cells 104).Memory array 200A includes access lines, such aswordlines 202 0 to 202 N, and a data line, such asbitline 204. Thewordlines 202 may be connected to global access lines (e.g., global wordlines), not shown inFIG. 2A , in a many-to-one relationship. For some embodiments,memory array 200A may be formed over a semiconductor that, for example, may be conductively doped to have a conductivity type, such as a p-type conductivity, e.g., to form a p-well, or an n-type conductivity, e.g., to form an n-well. -
Memory array 200A can be arranged in rows each corresponding to arespective wordline 202 and columns each corresponding to arespective bitline 204. Rows ofmemory cells 208 can be divided into one or more groups of physical pages ofmemory cells 208, and physical pages ofmemory cells 208 can include everyother memory cell 208 commonly connected to a givenwordline 202. For example,memory cells 208 commonly connected to wordline 202 N and selectively connected to even bitlines 204 (e.g.,bitlines memory cells 208 commonly connected to wordline 202 N and selectively connected to odd bitlines 204 (e.g.,bitlines FIG. 2A , it is apparent from the figure that thebitlines 204 of the array ofmemory cells 200A may be numbered consecutively frombitline 204 0 tobitline 204 M. Other groupings ofmemory cells 208 commonly connected to a givenwordline 202 may also define a physical page ofmemory cells 208. For certain memory devices, all memory cells commonly connected to a given wordline might be deemed a physical page of memory cells. The portion of a physical page of memory cells (which, in some embodiments, could still be the entire row) that is read during a single read operation or programmed during a single programming operation (e.g., an upper or lower page of memory cells) might be deemed a logical page of memory cells. A block of memory cells may include those memory cells that are configured to be erased together, such as all memory cells connected to wordlines 202 0-202 N (e.g., allstrings 206 sharing common wordlines 202). Unless expressly distinguished, a reference to a page of memory cells herein refers to the memory cells of a logical page of memory cells. - Each column can include a string of series-connected memory cells (e.g., non-volatile memory cells), such as one of
strings 206 0 to 206 M. Eachstring 206 can be connected (e.g., selectively connected) to a source line 216 (SRC) and can includememory cells 208 0 to 208 N. Thememory cells 208 of eachstring 206 can be connected in series between aselect gate 210, such as one of theselect gates 210 0 to 210 M, and aselect gate 212, such as one of theselect gates 212 0 to 212 M. In some embodiments, theselect gates 210 0 to 210 M are source-side select gates (SGS) and theselect gates 212 0 to 212 M are drain-side select gates.Select gates 210 0 to 210 M can be connected to a select line 214 (e.g., source-side select line) and selectgates 212 0 to 212 M can be connected to a select line 215 (e.g., drain-side select line). Theselect gates select gate 210 can be connected toSRC 216, and a drain of eachselect gate 210 can be connected to amemory cell 208 0 of thecorresponding string 206. Therefore, eachselect gate 210 can be configured to selectively connect acorresponding string 206 toSRC 216. A control gate of eachselect gate 210 can be connected to selectline 214. The drain of eachselect gate 212 can be connected to thebitline 204 for thecorresponding string 206. The source of eachselect gate 212 can be connected to amemory cell 208 N of thecorresponding string 206. Therefore, eachselect gate 212 might be configured to selectively connect acorresponding string 206 to thebitline 204. A control gate of eachselect gate 212 can be connected to selectline 215. - In some embodiments, and as will be described in further detail below with reference to
FIG. 2B , the memory array inFIG. 2A is a three-dimensional memory array, in which thestrings 206 extend substantially perpendicular to aplane containing SRC 216 and to a plane containing a plurality ofbitlines 204 that can be substantially parallel to theplane containing SRC 216. -
FIG. 2B is another schematic of a portion of an array of memory cells 200B (e.g., a portion of the array of memory cells 104) arranged in a three-dimensional memory array structure. The three-dimensional memory array 200B may incorporate vertical structures which may include semiconductor pillars where a portion of a pillar may act as a channel region of the memory cells ofstrings 206. Thestrings 206 may be each selectively connected to a bitline 204 0-204 M by aselect gate 212 and to theSRC 216 by aselect gate 210.Multiple strings 206 can be selectively connected to thesame bitline 204. Subsets ofstrings 206 can be connected to theirrespective bitlines 204 by biasing the select lines 215 0-215 L to selectively activate particularselect gates 212 each between astring 206 and abitline 204. Theselect gates 210 can be activated by biasing theselect line 214. Eachwordline 202 may be connected to multiple rows of memory cells of the memory array 200B. Rows of memory cells that are commonly connected to each other by aparticular wordline 202 may collectively be referred to as tiers. -
FIG. 2C depicts groupings of NAND strings 206 into blocks ofmemory cells 250, e.g., blocks of memory cells 250 0-250 L. Blocks ofmemory cells 250 can be groupings ofmemory cells 208 that can be erased together in a single erase operation, sometimes referred to as erase blocks. Each block ofmemory cells 250 can represent those NAND strings 206 commonly associated with a singleselect line 215, e.g.,select line 215 0. Thesource 216 for the block ofmemory cells 250 0 can be a same source as thesource 216 for the block ofmemory cells 250 L. For example, each block of memory cells 250 0-250 L can be commonly selectively connected to thesource 216.Access lines 202 andselect lines memory cells 250 can have no direct connection to accesslines 202 andselect lines - The bitlines 204 0-204 M can be connected (e.g., selectively connected) to a
buffer portion 240, which can be a portion of the page buffer 152 of thememory device 130. Thebuffer portion 240 can correspond to a memory plane (e.g., the set of blocks of memory cells 250 0-250 L). Thebuffer portion 240 can include sense circuits (which can include sense amplifiers) for sensing data values indicated onrespective bitlines 204. -
FIG. 2D is a diagram of a portion of an array ofmemory cells 200D (e.g., a portion of the array of memory cells 104). Channel regions (e.g., semiconductor pillars) 238 00 and 238 01 represent the channel regions of different strings of series-connected memory cells (e.g., strings 206 ofFIGS. 2A-2C ) selectively connected to thebitline 204 0. Similarly,channel regions FIGS. 2A-2C ) selectively connected to thebitline 204 1. A memory cell (not depicted inFIG. 2D ) may be formed at each intersection of anwordline 202 and achannel region 238, and the memory cells corresponding to asingle channel region 238 may collectively form a string of series-connected memory cells (e.g., astring 206 ofFIGS. 2A-2C ). Additional features might be common in such structures, such as dummy wordlines, segmented channel regions with interposed conductive regions, etc. -
FIG. 3 is a block schematic of a portion of an array ofmemory cells 300 as could be used in a memory of the type described with reference toFIG. 1B . The array ofmemory cells 300 is depicted as having four memory planes 350 (e.g., memory planes 350 0-350 3), each in communication with arespective buffer portion 240, which can collectively form apage buffer 352. While fourmemory planes 350 are depicted, other numbers ofmemory planes 350 can be commonly in communication with apage buffer 352. Eachmemory plane 350 is depicted to include L+1 blocks of memory cells 250 (e.g., blocks of memory cells 250 0-250 L). -
FIG. 4 illustrates example arrangements of a target wordline (WLn) and corresponding adjacent or neighboring wordlines (WLn−1 and WLn+1) during execution of a read operation (401) and execution of a program verify operation (402), according to embodiments of the present disclosure. As shown in the example 401, a read operation is executed to read a set of target cells associated with a selected or target wordline (WLn) including application of asymmetric pass through voltage levels to WLn−1 and WLn+1. In the read operation, during application of a read voltage (Vread) to the target wordline, a first pass through voltage (Vpass1) is applied to WLn−1 and a second pass through voltage (Vpass2) is applied toWLn+ 1. - In an embodiment, for the lowest read level (R1) on the target wordline (WLn), a symmetric pass through voltage is applied to both WLn−1 and WLn+1 (i.e., the same Vpass is applied to WLn−1 and WLn+1) and the asymmetric pass through voltages (Vpass1 applied to WLn−1 and Vpass2 applied to WLn+1) for all other read levels (e.g., R2, R3 . . . R15 for a QLC memory device). According to this embodiment, processing logic (e.g., processing logic of the memory sub-system controller) determines the read level associated with the target wordline and perform the following actions: 1) if the read level is R1, apply the same Vpass to WLn−1 and WLn+1; or 2) if the read level is R2 or greater, apply Vpass1 to WLn−1 and Vpass2 to
WLn+ 1, where Vpass1=Vpass2−Vpass_offset. - In another embodiment, the asymmetric pass through voltages (Vpass1 applied to WLn−1 and Vpass2 applied to WLn+1) is applied for all read levels of WLn (e.g., R1, R2, R3 . . . R15 for a QLC memory device). In this embodiment, processing logic causes application of Vpass1 to WLn−1 and Vpass2 to WL+1 for all read levels of WLn.
- In a second example 402, a program verify operation is executed to verify a programming of a set of target cells associated with the selected or target wordline (WLn) including application of the asymmetric pass through voltage levels to WLn−1 and WLn+1. In a read sub-operation of the program verify operation, during application of a read voltage (Vread_pv) to the target wordline, a first pass through voltage (Vpass1) is applied to WLn−1 and a second pass through voltage (Vpass2) is applied to
WLn+ 1. - According to embodiments, in examples 401 and 402, Vpass1 is determined in accordance with the following expression:
-
Vpass1=Vpass2−Vpass_offset; - where Vpass_offset is in a range of approximately 0.1V to approximately 1.5V. For example, Vpass2 can be in a range of approximately 6.0V to approximately 7.5V and Vpass1 can be in a range of approximately 4.5V to 6.0V. In an example, Vpass2 can be approximately 6.5V, Vpass_offset can be approximately 0.7V, and Vpass1 can be approximately 5.8V.
- According to embodiments, the pass through voltage applied to the first wordline (i.e., WLn−1) adjacent to the target wordline (WLn) is lower than the pass through voltage applied to a second wordline (WLn+1) adjacent to the target wordline during the execution of a read operation on the target wordline and the execution of a program verify operation on the target wordline, where the order of programming is WLn−1 followed by WLn followed by WLn+1, regardless of the “drain to source” or “source to drain” program scheme. Advantageously, the application of Vpass1 to WLn−1 that is lower than Vpass applied to WLn+1 increases the read window budget by reducing the C2C coupling on WLn when programming
WLn+ 1. Furthermore, the application of asymmetric pass through voltage levels to WLn−1 and WLn+1 reduces read disturb as a result of the lower pass through voltage (Vpass1) on WLn−1. In addition, the asymmetric approach during read operations and program verify operations produces a higher neutral threshold voltage and increased retention due to the need for a lower trapped charge on programmed levels in the storage node. - In an embodiment, symmetric pass through voltages (i.e., the same Vpass is applied to WLn−1 and WLn+1) on a lowest read level (i.e., R1) and a lowest program verify level (i.e., PV1) and asymmetric pass through voltages are applied to WLn−1 and WLn+1 during execution of a read operation or a program verify operation on all other read levels and program verify levels above the lowest read level/program verify level (e.g., R2/PV2, R3/PV3 . . . R15/PV15 for a QLC memory device). The use of symmetric or equal pass through voltages for both neighboring wordlines (Vpass on WLn−1=Vpass on WLn+1) for execution of a read operation on a lowest level (R1) and execution of a program verify operation on a lowest level (PV1) and asymmetric pass through voltages on WLn−1 and WLn+1 for execution of read operations and program verify operations at all other programmed levels (R2/PV2 and above) reduces “pinching” of the threshold voltage of WLn (i.e., an unwanted increase in the Vt of WLn) that can be caused by lowering the pass through on WLn−1. Furthermore, since lowering or reducing Vpass1 on WLn-1 (i.e., the side opposite the aggression) as compared to Vpass2 on
WLn+ 1. According to embodiments, a sensed data value (e.g., a current level) associated with the target wordline is used to determine completion of the memory access operation (i.e., completion of the read operation of the target wordline). -
FIG. 5 illustrates a graph plotting a level or percent of C2C interference as a function of a threshold volt (Vt) shift of an aggressor wordline (WLn+1), according to embodiments of the present disclosure. As shown, the C2C interference is advantageously reduced when applying an asymmetric Vpass to adjacent wordlines during a read operation or a program verify operation (501) as compared to application of a symmetric Vpass to the adjacent wordlines during a read operation or a program verify operation (502). As illustrated, the asymmetric Vpass includes the application of a first pass through voltage (Vpass1) to WLn−1 that is lower than a second pass through voltage (Vpass2) applied to WLn+1 during a read operation or a program verify operation executed on a target wordline (WLn). As shown inFIG. 5 , the C2C interference level (percentage) corresponding to the asymmetric pass through voltage process during a read operation or a program verify operation of the present disclosure is improved (i.e., Vpass1 applied to WLn−1<Vpass2 applied to WLn+1), as compared to the symmetric approach (i.e., the same Vpass applied to both WLn−1 and WLn+1 for all read and program verify levels). -
FIG. 6 illustrates example arrangements of a target wordline (WLn) and corresponding neighboring wordlines (WLn−1 and WLn+1) during execution of a read operation or a program verify operation with an asymmetric pass through voltage applied to the neighboring wordlines during apre-aggression stage 601 and apost-aggression stage 602, according to embodiments of the present disclosure. According to embodiments,FIG. 6 illustrates a drain-to-source programming scheme including achannel 603. Advantageously, application of Vpass1 to WLn−1 and Vpass2 to WLn+1 (where Vpass1=Vpass2−Vpass_offset) during a read operation or a program verify operation causes a lowfree electron region 604 of thechannel 603 to move toward the drain-side and away from the aggression side (i.e., the source-side). Advantageously, application of asymmetric pass through voltages to WLn−1 and WLn+1 during a read operation or read sub-operation of program verify operation causes a relative change in effective length (ΔLeff/Leff) to be reduced. The reduction in the relative change in effective length results in a reduction of short channel effects and a lower threshold voltage change related to the aggression and a corresponding lowering of the C2C interference. -
FIG. 7 is a flow diagram of anexample method 700 to perform a memory access operation (e.g., a read operation or a program verify operation) of a target wordline (WLn) including application of asymmetric pass through voltage levels to neighboring wordlines (WLn−1 and WLn+1) to reduce C2C interference, in accordance with some embodiments of the present disclosure. Themethod 700 can be performed by processing logic that can include hardware (e.g., processing device, circuitry, dedicated logic, programmable logic, microcode, hardware of a device, integrated circuit, etc.), software (e.g., instructions run or executed on a processing device), or a combination thereof. In some embodiments, themethod 700 is performed by the pass throughvoltage manager 134 ofFIGS. 1A-1B . Although shown in a particular sequence or order, unless otherwise specified, the order of the processes can be modified. Thus, the illustrated embodiments should be understood only as examples, and the illustrated processes can be performed in a different order, and some processes can be performed in parallel. Additionally, one or more processes can be omitted in various embodiments. Thus, not all processes are required in every embodiment. Other process flows are possible. - At
operation 710, an operation is initiated with respect to a set of target memory cells. For example, processing logic (e.g., the pass through voltage manager ofFIGS. 1A-1B ) can cause a memory access operation to be initiated to read the set of target memory cells of a target wordline (WLn). The memory access operation can be initiated in response to a request received by a memory sub-system controller (e.g., thememory sub-system controller 115 ofFIGS. 1A-1B ) from a host system. Each target memory cell of the set of target memory cells is connected to the target wordline (WLn). According to embodiments, the memory access operation can include a read operation or a program verify operation including a read sub-operation. - At operation 720, a voltage is applied. For example, the processing logic can cause, during the memory access operation, a read voltage level (Vread) to be applied to the target wordline. In an embodiment, the read voltage level (Vread) can correspond to a programmed level of the target wordline (e.g., R1, R2, R3 . . . Rfinal, where R1 is the lowest read voltage level and Rfinal is a highest read voltage level or PV1, PV2, PV3 . . . PVfinal, where PV1 is the lowest read voltage level of a read sub-operation of a program verify operation and PVfinal is a highster read voltage level of a read sub-operation of a program verify operation).
- At
operation 730, pass through voltages are applied. For example, the processing logic can cause, during the memory access operation, a first pass through voltage level to be applied to a first wordline adjacent to the target wordline and a second pass through voltage level to be applied to a second wordline adjacent to the target wordline, where the first pass through voltage level is less than the second pass through voltage level. According to embodiments, the first pass through voltage level (Vpass1) applied to the first wordline (WLn−1) is equal to the second pass through voltage level (Vpass2) reduced by an offset value (Vpass_offset). - For example, Vpass_offset is in a range of approximately 0.1V to approximately 1.5V, Vpass2 can be in a range of approximately 6.0V to approximately 7.5V and Vpass1 can be in a range of approximately 4.5V to 6.0V. In an example, Vpass2 can be approximately 6.5V, Vpass_offset can be approximately 0.7V, and Vpass1 can be approximately 5.8V.
- In an embodiment, the processing logic can determine the read voltage level associated with the memory access operation and, if the read voltage level is a lowest level (e.g., R1 or PV1), the processing logic can apply the same pass through voltage level to both the first wordline and the second wordline (e.g., Vpass1 equals Vpass2). In this embodiment, for all other read voltage levels (R2/PV2, R3/PV3 . . . Rfinal/PVfinal), the processing logic cause application of Vpass1 to the first wordline and Vpass2 to the second wordline, where Vpass1 is less than Vpass2 (i.e., Vpass1=Vpass2−Vpass_offset).
- In an embodiment, the processing logic can cause application of Vpass1 to the first wordline and Vpass2 to the second wordline, where Vpass1 is less than Vpass2 (i.e., Vpass1=Vpass2−Vpass_offset) when applying all read voltage levels to the target wordline (e.g., R1/PV1, R2/PV2 . . . Rfinal/PVfinal).
- According to embodiments, a sensed data value (e.g., a current level) associated with the target wordline is used to determine completion of the memory access operation (i.e., confirmation that the target memory cells being read have been turned on and the read operation is complete).
-
FIG. 8 illustrates an example machine of acomputer system 800 within which a set of instructions, for causing the machine to perform any one or more of the methodologies discussed herein, can be executed. In some embodiments, thecomputer system 800 can correspond to a host system (e.g., thehost system 120 ofFIG. 1A ) that includes, is coupled to, or utilizes a memory sub-system (e.g., thememory sub-system 110 ofFIG. 1A ) or can be used to perform the operations of a controller (e.g., to execute an operating system to perform operations corresponding to the pass throughvoltage manager 134 ofFIG. 1A andFIG. 1B ). In alternative embodiments, the machine can be connected (e.g., networked) to other machines in a LAN, an intranet, an extranet, and/or the Internet. The machine can operate in the capacity of a server or a client machine in client-server network environment, as a peer machine in a peer-to-peer (or distributed) network environment, or as a server or a client machine in a cloud computing infrastructure or environment. - The machine can be a personal computer (PC), a tablet PC, a set-top box (STB), a Personal Digital Assistant (PDA), a memory cellular telephone, a web appliance, a server, a network router, a switch or bridge, or any machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. Further, while a single machine is illustrated, the term “machine” shall also be taken to include any collection of machines that individually or jointly execute a set (or multiple sets) of instructions to perform any one or more of the methodologies discussed herein.
- The
example computer system 800 includes aprocessing device 802, a main memory 804 (e.g., read-only memory (ROM), flash memory, dynamic random access memory (DRAM) such as synchronous DRAM (SDRAM) or RDRAM, etc.), a static memory 806 (e.g., flash memory, static random access memory (SRAM), etc.), and adata storage system 818, which communicate with each other via abus 830. -
Processing device 802 represents one or more general-purpose processing devices such as a microprocessor, a central processing unit, or the like. More particularly, the processing device can be a complex instruction set computing (CISC) microprocessor, reduced instruction set computing (RISC) microprocessor, very long instruction word (VLIW) microprocessor, or a processor implementing other instruction sets, or processors implementing a combination of instruction sets.Processing device 802 can also be one or more special-purpose processing devices such as an application specific integrated circuit (ASIC), a field programmable gate array (FPGA), a digital signal processor (DSP), network processor, or the like. Theprocessing device 602 is configured to executeinstructions 826 for performing the operations and steps discussed herein. Thecomputer system 800 can further include anetwork interface device 808 to communicate over thenetwork 820. - The
data storage system 818 can include a machine-readable storage medium 824 (also known as a computer-readable medium) on which is stored one or more sets ofinstructions 826 or software embodying any one or more of the methodologies or functions described herein. Theinstructions 826 can also reside, completely or at least partially, within themain memory 804 and/or within theprocessing device 802 during execution thereof by thecomputer system 800, themain memory 804 and theprocessing device 802 also constituting machine-readable storage media. The machine-readable storage medium 824,data storage system 818, and/ormain memory 804 can correspond to thememory sub-system 110 ofFIG. 1A . - In one embodiment, the
instructions 826 include instructions to implement functionality corresponding to a CR component (e.g., the pass throughvoltage manager 134 ofFIG. 1A andFIG. 1B ). While the machine-readable storage medium 824 is shown in an example embodiment to be a single medium, the term “machine-readable storage medium” should be taken to include a single medium or multiple media that store the one or more sets of instructions. The term “machine-readable storage medium” shall also be taken to include any medium that is capable of storing or encoding a set of instructions for execution by the machine and that cause the machine to perform any one or more of the methodologies of the present disclosure. The term “machine-readable storage medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical media, and magnetic media. - Some portions of the preceding detailed descriptions have been presented in terms of algorithms and symbolic representations of operations on data bits within a computer memory. These algorithmic descriptions and representations are the ways used by those skilled in the data processing arts to most effectively convey the substance of their work to others skilled in the art. An algorithm is here, and generally, conceived to be a self-consistent sequence of operations leading to a desired result. The operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical or magnetic signals capable of being stored, combined, compared, and otherwise manipulated. It has proven convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like.
- It should be borne in mind, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to these quantities. The present disclosure can refer to the action and processes of a computer system, or similar electronic computing device, that manipulates and transforms data represented as physical (electronic) quantities within the computer system's page buffers and memories into other data similarly represented as physical quantities within the computer system memories or page buffers or other such information storage systems.
- The present disclosure also relates to an apparatus for performing the operations herein. This apparatus can be specially constructed for the intended purposes, or it can include a general purpose computer selectively activated or reconfigured by a computer program stored in the computer. Such a computer program can be stored in a computer readable storage medium, such as any type of disk including floppy disks, optical disks, CD-ROMs, and magnetic-optical disks, read-only memories (ROMs), random access memories (RAMs), EPROMs, EEPROMs, magnetic or optical cards, or any type of media suitable for storing electronic instructions, each coupled to a computer system bus.
- The algorithms and displays presented herein are not inherently related to any particular computer or other apparatus. Various general purpose systems can be used with programs in accordance with the teachings herein, or it can prove convenient to construct a more specialized apparatus to perform the method. The structure for a variety of these systems will appear as set forth in the description below. In addition, the present disclosure is not described with reference to any particular programming language. It will be appreciated that a variety of programming languages can be used to implement the teachings of the disclosure as described herein.
- The present disclosure can be provided as a computer program product, or software, that can include a machine-readable medium having stored thereon instructions, which can be used to program a computer system (or other electronic devices) to perform a process according to the present disclosure. A machine-readable medium includes any mechanism for storing information in a form readable by a machine (e.g., a computer). In some embodiments, a machine-readable (e.g., computer-readable) medium includes a machine (e.g., a computer) readable storage medium such as a read only memory (“ROM”), random access memory (“RAM”), magnetic disk storage media, optical storage media, flash memory components, etc.
- In the foregoing specification, embodiments of the disclosure have been described with reference to specific example embodiments thereof. It will be evident that various modifications can be made thereto without departing from the broader spirit and scope of embodiments of the disclosure as set forth in the following claims. The specification and drawings are, accordingly, to be regarded in an illustrative sense rather than a restrictive sense.
Claims (20)
1. A system comprising:
a memory device; and
a processing device, operatively coupled with the memory device, to perform operations comprising:
initiating a memory access operation to read a set of target memory cells of a target wordline of the memory device;
causing, during the memory access operation, a read voltage level to be applied to the target wordline;
causing, during the memory access operation, a first pass through voltage level to be applied to a first wordline adjacent to the target wordline; and
causing, during the memory access operation, a second pass through voltage to be applied to a second wordline adjacent to the target wordline, wherein the first pass through voltage level is less than the second pass through voltage level.
2. The system of claim 1 , wherein the first pass through voltage level is the second pass through voltage level reduced by an offset value.
3. The system of claim 1 , the operations further comprising sensing a current level associated with the target wordline to confirm completion of the memory access operation.
4. The system of claim 1 , wherein the first wordline adjacent to the target wordline is programmed prior to the target wordline, and wherein the target wordline is programmed prior to the second wordline adjacent to the target wordline.
5. The system of claim 1 , wherein the memory access operation comprises a read operation.
6. The system of claim 1 , wherein the memory access operation comprises a program verify operation having a read sub-operation.
7. The system of claim 1 , the operations further comprising determining the read voltage level is greater than a lowest read voltage level.
8. A method comprising:
initiating, by a processing device, a memory access operation to read a set of target memory cells of a target wordline of a memory device;
causing, during the memory access operation, a read voltage level to be applied to the target wordline;
causing, during the memory access operation, a first pass through voltage level to be applied to a first wordline adjacent to the target wordline; and
causing, during the memory access operation, a second pass through voltage to be applied to a second wordline adjacent to the target wordline, wherein the first pass through voltage level is less than the second pass through voltage level.
9. The method of claim 8 , wherein the first pass through voltage level is the second pass through voltage level reduced by an offset value.
10. The method of claim 8 , further comprising sensing a current level associated with the target wordline to confirm completion of the memory access operation.
11. The method of claim 8 , wherein the first wordline adjacent to the target wordline is programmed prior to the target wordline, and wherein the target wordline is programmed prior to the second wordline adjacent to the target wordline.
12. The method of claim 8 , wherein the memory access operation comprises a read operation.
13. The method of claim 8 , wherein the memory access operation comprises a program verify operation having a read sub-operation.
14. The method of claim 8 , further comprising determining the read voltage level is greater than a lowest read voltage level.
15. A non-transitory computer-readable storage medium comprising instructions that, when executed by a processing device, cause the processing device to perform operations comprising:
initiating a memory access operation to read a set of target memory cells of a target wordline of a memory device;
causing, during the memory access operation, a read voltage level to be applied to the target wordline;
causing, during the memory access operation, a first pass through voltage level to be applied to a first wordline adjacent to the target wordline; and
causing, during the memory access operation, a second pass through voltage to be applied to a second wordline adjacent to the target wordline, wherein the first pass through voltage level is less than the second pass through voltage level.
16. The non-transitory computer-readable storage medium of claim 15 , wherein the first pass through voltage level is the second pass through voltage level reduced by an offset value.
17. The non-transitory computer-readable storage medium of claim 15 , further comprising sensing a current level associated with the target wordline to confirm completion of the memory access operation.
18. The non-transitory computer-readable storage medium of claim 15 , wherein the first wordline adjacent to the target wordline is programmed prior to the target wordline, and wherein the target wordline is programmed prior to the second wordline adjacent to the target wordline.
19. The non-transitory computer-readable storage medium of claim 15 , wherein the memory access operation comprises one of a read operation or a program verify operation comprising a read sub-operation.
20. The non-transitory computer-readable storage medium of claim 15 , the operations further comprising determining the read voltage level is greater than a lowest read voltage level.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US18/236,087 US20240069749A1 (en) | 2022-08-30 | 2023-08-21 | Asymmetric pass through voltage for reduction of cell-to-cell interference |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202263402258P | 2022-08-30 | 2022-08-30 | |
US18/236,087 US20240069749A1 (en) | 2022-08-30 | 2023-08-21 | Asymmetric pass through voltage for reduction of cell-to-cell interference |
Publications (1)
Publication Number | Publication Date |
---|---|
US20240069749A1 true US20240069749A1 (en) | 2024-02-29 |
Family
ID=89999525
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/236,087 Pending US20240069749A1 (en) | 2022-08-30 | 2023-08-21 | Asymmetric pass through voltage for reduction of cell-to-cell interference |
Country Status (1)
Country | Link |
---|---|
US (1) | US20240069749A1 (en) |
-
2023
- 2023-08-21 US US18/236,087 patent/US20240069749A1/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230133227A1 (en) | Dynamic step voltage level adjustment | |
US11887668B2 (en) | All levels programming of a memory device in a memory sub-system | |
US11961566B2 (en) | Fast bit erase for upper tail tightening of threshold voltage distributions | |
CN115705896A (en) | Charge loss compensation during read operations in a memory device | |
US11574690B2 (en) | Sequential wordline erase verify schemes | |
US20240069749A1 (en) | Asymmetric pass through voltage for reduction of cell-to-cell interference | |
US20240071530A1 (en) | Corrective program verify operation with improved read window budget retention | |
US20230206999A1 (en) | Erase operation with electron injection for reduction of cell-to-cell interference in a memory sub-system | |
US20240038316A1 (en) | Program refresh with gate-induced drain leakage | |
US20230197164A1 (en) | Bias voltage schemes during pre-programming and programming phases | |
US20230162796A1 (en) | Program scheme for edge data wordlines in a memory device | |
US20240170069A1 (en) | Execution of prologue sub-operations of a programming operation during data loading | |
US20230335201A1 (en) | Conditional valley tracking during corrective reads | |
US20230305717A1 (en) | Corrective reads implementing incremental reads with respect to adjacent wordlines | |
US11894069B2 (en) | Unselected sub-block source line and bit line pre-charging to reduce read disturb | |
US20230360696A1 (en) | Corrective reads with improved recovery from data retention loss | |
US20240071515A1 (en) | Erase pulse loop dependent adjustment of select gate erase bias voltage | |
US20230178155A1 (en) | Fast two-sided corrective read operation in a memory device | |
US11742036B2 (en) | Reducing maximum programming voltage in memory programming operations | |
US20230195328A1 (en) | Multi-stage erase operation of memory cells in a memory sub-system | |
US20230207018A1 (en) | Charge loss acceleration during programming of memory cells in a memory sub-system | |
US20230352098A1 (en) | Boost voltage modulated corrective read | |
US20240028253A1 (en) | Fast program recovery with reduced programing disturbance in a memory device | |
US20230112381A1 (en) | Using non-segregated cells as drain-side select gates for sub-blocks in a memory device | |
US20230335200A1 (en) | Auto-calibrated corrective read |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MICRON TECHNOLOGY, INC., IDAHO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BENVENUTI, AUGUSTO;PAOLUCCI, GIOVANNI MARIA;URBANI, ALESSIO;AND OTHERS;SIGNING DATES FROM 20230801 TO 20230821;REEL/FRAME:064653/0114 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |